Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA
One of the best methods to improve the security of cryptographic systems used to exchange sensitive information is to attack them to find their vulnerabilities and to strengthen them in subsequent designs. Trivium stream cipher is one of the lightweight ciphers designed for security applications in...
Main Authors: | Francisco Eugenio Potestad-Ordóñez, Manuel Valencia-Barrero, Carmen Baena-Oliva, Pilar Parra-Fernández, Carlos Jesús Jiménez-Fernández |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-12-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/20/23/6909 |
Similar Items
-
Research on linear approximations of simplified Trivium
by: Meng MA, et al.
Published: (2016-06-01) -
Research on linear approximations of simplified Trivium
by: Meng MA, et al.
Published: (2016-06-01) -
TriviA and uTriviA : two fast and secure authenticated encryption schemes
by: Chakraborti, Avik, et al.
Published: (2020) -
A New Practical Cube Attack via Recovering Numerous Superpolys
by: Min Zhang, et al.
Published: (2024-12-01) -
Using SAT Solvers to Finding Short Cycles in Cryptographic Algorithms
by: Władysław Dudzic, et al.
Published: (2020-09-01)