2010 IEEE Computer Society Annual Symposium on VLSI 2010
DOI: 10.1109/isvlsi.2010.14
|View full text |Cite
|
Sign up to set email alerts
|

Differential Power Analysis of CAST-128

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Nonlinearity : It is one of the most important features in the S-box value evaluation criteria [ 28 ]. Mathematically, it can be defined by: where the dot product between x and w is defined by: …”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Nonlinearity : It is one of the most important features in the S-box value evaluation criteria [ 28 ]. Mathematically, it can be defined by: where the dot product between x and w is defined by: …”
Section: Resultsmentioning
confidence: 99%
“…In this research, a hybridization of a chaotic system based on a cast encryption algorithm is used to encrypt different types of digital images. CAST-128 is a procedure designed to be used as a symmetric encryption algorithm, which was developed by Carlisle Adams and Stafford Tavares [ 27 , 28 , 29 ]. CAST-128 is a classical feistily network, consisting of 16 rounds and operating based on 64-bit blocks of plaintext, with 64-bit blocks then being produced as a cipher text.…”
Section: Introductionmentioning
confidence: 99%
“…K.H. Boey et al, power analysis has been applied to attacks on CAST-128 which is the only algorithm that has not been practically broken either on ASIC or GPGA [5]. Author uses 128 bits of secret key within 300, 500 power traces to reveals the outlines an approach on attacking the registers rather than S-box.…”
mentioning
confidence: 99%