2021
DOI: 10.1007/978-3-030-92518-5_13
|View full text |Cite
|
Sign up to set email alerts
|

Differential Fault Attack on Espresso

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…In fact, when the famous Rijndael was selected as Advanced Encryption Standard (AES), there was also a need for lightweight ciphers for specific applications (Zhang et al 2019). Since then, many lightweight cryptographic algorithms, such as LBlock (Wang et al 2019), PRESENT (Cnudde and Nikova 2017), GIFT (Xie et al 2021), Espresso (Bathe et al 2021), KLEIN (Xiao and Wang 2022), et al, were successively proposed. Inspired by these block ciphers, many researchers intend to design new and more efficient schemes.…”
Section: Introductionmentioning
confidence: 99%
“…In fact, when the famous Rijndael was selected as Advanced Encryption Standard (AES), there was also a need for lightweight ciphers for specific applications (Zhang et al 2019). Since then, many lightweight cryptographic algorithms, such as LBlock (Wang et al 2019), PRESENT (Cnudde and Nikova 2017), GIFT (Xie et al 2021), Espresso (Bathe et al 2021), KLEIN (Xiao and Wang 2022), et al, were successively proposed. Inspired by these block ciphers, many researchers intend to design new and more efficient schemes.…”
Section: Introductionmentioning
confidence: 99%