2014
DOI: 10.1007/978-3-319-12778-1_15
|View full text |Cite
|
Sign up to set email alerts
|

Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 3 publications
0
8
0
Order By: Relevance
“…Suppose the attacker injects a fault n times into an encryption process that uses a fixed plaintext. If the i-th fault injection equation is expressed as A (B ⊕ ∆B i ) = C ⊕ ∆C i where 0 < i ≤ n, n fault injections are expressed by the following system of equations (5).…”
Section: A Analysis Of Modular Additionmentioning
confidence: 99%
See 4 more Smart Citations
“…Suppose the attacker injects a fault n times into an encryption process that uses a fixed plaintext. If the i-th fault injection equation is expressed as A (B ⊕ ∆B i ) = C ⊕ ∆C i where 0 < i ≤ n, n fault injections are expressed by the following system of equations (5).…”
Section: A Analysis Of Modular Additionmentioning
confidence: 99%
“…This system of equations can be solved using the theories introduced in Sections II-D and II-E. First, each equation is represented as a binary-system of equations over GF (2). The system of equations (5), which was composed of (n + 1) equations over GF 2 32 , is transformed into a binary-system of equations composed of 32 × (n + 1) equations over GF (2) as shown in the system of equations (6).…”
Section: A Analysis Of Modular Additionmentioning
confidence: 99%
See 3 more Smart Citations