2023
DOI: 10.1016/j.vlsi.2023.02.013
|View full text |Cite
|
Sign up to set email alerts
|

SAND-2: An optimized implementation of lightweight block cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…the white-box model [4]. In key extraction attack, the attacker tries to extract the key from the white-box implementation [5]; in decomposition attack, the attacker tries to find a less costly implementation to maintain the exact same functionality as the original version; in code extraction attack, the attacker uses the original cryptographic program as a large valid key for encrypting/decrypting on different devices.…”
Section: An Attacker Can Launch Key Extraction Attack Decomposition A...mentioning
confidence: 99%
“…the white-box model [4]. In key extraction attack, the attacker tries to extract the key from the white-box implementation [5]; in decomposition attack, the attacker tries to find a less costly implementation to maintain the exact same functionality as the original version; in code extraction attack, the attacker uses the original cryptographic program as a large valid key for encrypting/decrypting on different devices.…”
Section: An Attacker Can Launch Key Extraction Attack Decomposition A...mentioning
confidence: 99%