2019 22nd Euromicro Conference on Digital System Design (DSD) 2019
DOI: 10.1109/dsd.2019.00099
|View full text |Cite
|
Sign up to set email alerts
|

Side-Channel Attack on the A5/1 Stream Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…More precisely, this paper focuses on its underlying Linear Feedback Shift Registers (LFSR), in a block cipher combined with a mode construction. Some attacks exist yet as in [34,22,10,11,24,23], but this work differs from state-of-the-art attacks by its attacker model. To the best of our knowledge, there is no blind side channel attack on LFSR in the context of authenticated encryption except our previous contribution [20].…”
Section: Motivationmentioning
confidence: 99%
“…More precisely, this paper focuses on its underlying Linear Feedback Shift Registers (LFSR), in a block cipher combined with a mode construction. Some attacks exist yet as in [34,22,10,11,24,23], but this work differs from state-of-the-art attacks by its attacker model. To the best of our knowledge, there is no blind side channel attack on LFSR in the context of authenticated encryption except our previous contribution [20].…”
Section: Motivationmentioning
confidence: 99%
“…Different sets of security flaws have been produced by the embedded nature of embedded systems and sensors [68]. For instance, embedded systems are susceptible to assaults that deplete their battery power because of their restricted battery capacity [69]. Embedded systems are vulnerable to assaults that need physical access to the system because of how close they are to a prospective attacker.…”
Section: Other Emerging Areas Of Concernmentioning
confidence: 99%
“…To guarantee that the online page is only accessible by authorized users, the most frequent protection method against web browser vulnerabilities takes the shape of stronger user authentication. Another widely used method [69] for finding any dan-gerous scripts included in web pages is content filtering. To strengthen browser security, certain browsers or browser extensions may be set up to deactivate client-side scripting on a per-domain basis.…”
Section: Prevent Emerging Threatsmentioning
confidence: 99%