Security of Block Ciphers: From Algorithm Design to Hardware ImplementationA comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis
|
Other editions - View all
Security of Block Ciphers: From Algorithm Design to Hardware Implementation Kazuo Sakiyama No preview available - 2015 |
Common terms and phrases
active bytes AES round Analysis and Fault Analysis on Block attack complexity bits Block Ciphers brute force attack byte-fault model calculation chosen plaintext attack clock cycle clock signal column combinatorial logics computational cost correct key countermeasure Cryptanalysis on Block cryptographic differential cryptanalysis differential propagation Digital Circuits DPA attack evaluation fault injection fault model faulty byte position gate Hardware Implementations HW model impossible differential characteristic impossible differential cryptanalysis input difference integral cryptanalysis integral DFA inverse key candidates key guess key recovery algorithm key recovery attack key schedule linear masking mean traces MixColumns operation module nonlinear output difference partial decryption power consumption power traces probability recover the key reset round function S-box SB SR MC secret key Security of Block ShiftRows operation shown in Figure Side-Channel Analysis side-channel attacks side-channel information SubBytes operation subkey space target intermediate value WDDL wrong key suggestions