2014
DOI: 10.1007/s11432-013-5053-9
|View full text |Cite
|
Sign up to set email alerts
|

Toward reverse engineering on secret S-boxes in block ciphers

Abstract: On the Bit-Based Division Property of S-boxes SCIENCE CHINA Information Sciences The DBlock family of block ciphers SCIENCE CHINA Information Sciences 58, 032105 (2015); Construction of MDS block diffusion matrices for block ciphers and hash functions SCIENCE CHINA Information Sciences 59, 099101 (2016); SQUARE attack on block ciphers with low algebraic degree SCIENCE CHINA Information Sciences 53, 1988 (2010); Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers SCIENCE CHIN… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 15 publications
(40 reference statements)
0
2
0
Order By: Relevance
“…The carry reduction procedure can be summarized by (8). The details of the procedure are shown in Figure 4.…”
Section: Byte-by-byte Recovery Of Primementioning
confidence: 99%
See 1 more Smart Citation
“…The carry reduction procedure can be summarized by (8). The details of the procedure are shown in Figure 4.…”
Section: Byte-by-byte Recovery Of Primementioning
confidence: 99%
“…The attack methods can extract the secret cryptographic key or intermediate values, including power consumption, electromagnetic emissions, timing, or faults collected from a running cryptographic device, by using statistical tools operating on side channel leakages. Many studies have provided practical attack results on embedded devices [6][7][8]. Recently, papers have been published that describe attack procedures on specific PKC schemes implemented on PCs [9][10][11] and mobile phones [12,13].…”
Section: Introductionmentioning
confidence: 99%