Citation: | FENG Jingyi, CHEN Hua, GAO Si, et al., “Fault Analysis on a New Block Cipher DBlock with at Most Two Fault Injections,” Chinese Journal of Electronics, vol. 27, no. 6, pp. 1277-1282, 2018, doi: 10.1049/cje.2018.09.003 |
D. Boneh, R.A. DeMillo and R.J. Lipton, “On the importance of checking cryptographic protocols for faults”, Advances in Cryptology-EUROCRYPT 97, Vol.1233 of Lecture Notes in Computer Science, pp.37-51, 1997.
|
E. Biham and A. Shamir, “Differential fault analysis of secret key cryptosystems”, Advances in Cryptology-CRYPTO 97, Vol.1294 of Lecture Notes in Computer Science, pp.513-525, 1997.
|
G. Piret and J.J. Quisquater, “A differential fault attack technique against spn structures, with application to the aes and khazad”, Proc. of Cryptographic Hardware and Embedded Systems-CHES 2003, Vol.2779 of Lecture Notes in Computer Science, pp.77-88, 2003.
|
C. Chen and S. Yen, “Differential fault analysis on AES key schedule and some countermeasures”, Information Security and Privacy, Vol.2727 of Lecture Notes in Computer Science, pp.118-129, 2003.
|
P. Dusart, G. Letourneux and O. Vivolo, “Differential fault analysis on AES”, Applied Cryptography and Network SecurityACNS 2003, Lecture Notes in Computer Science, Vol.2846 pp.293-306, 2003.
|
L. Hemme, “A differential fault attack against early rounds of (triple-) DES”, Proc. of Cryptographic Hardware and Embedded Systems-CHES 2004, Lecture Notes in Computer Science, Vol.3156, pp.254-267, 2004.
|
H. Chen, W. Wu and D. Feng, “Differential fault analysis on CLEFIA”, Information and Communications Security, Vol.4861 of Lecture Notes in Computer Science, pp.284-295, 2007.
|
Y. Zhou, W. Wu, N. Xu, et al., “Differential fault attack on camellia”, Chinese Journal of Electronics, Vol.18, No.1, pp.13-19, 2009.
|
I. Biehl, B. Meyer and V. Müller, “Differential fault attacks on elliptic curve cryptosystems”, Advances in CryptologyCRYPTO 2000, Lecture Notes in Computer Science, Vol.1880, pp.131-146, 2000.
|
E. Biham, L. Granboulan and P.Q. Nguyên, “Impossible fault analysis of RC4 and differential fault analysis of RC4”, Proc. of Fast Software Encryption-FSE 2005, Lecture Notes in Computer Science, Vol.3557, pp.359-367, 2005.
|
M. Hojsík and B. Rudolf, “Differential fault analysis of trivium”, Proc. of Fast Software Encryption-FSE 2008, Lecture Notes in Computer Science, Vol.5086, pp.158-172, 2008.
|
W. Wu, L. Zhang and X. Yu, “The DBlock family of block ciphers”, Science China Information Sciences, Vol.58, No.3, pp.1-14, 2015.
|
E. Biham and A. Shamir, “Differential cryptanalysis of DES-like cryptosystems”, Journal of Cryptology, Vol.4, No.1, pp.3-72, 1991.
|
R. Li, B. Sun, C. Li, et al., “Differential fault analysis on SMS4 using a single fault”, Information Processing Letters, Vol.111, No.4, pp.156-163, 2011.
|
R. Li and C. Jin, “Meet-in-the-middle attacks on 10-round AES-256”, Designs, Codes and Cryptography, Vol.80, No.3, pp.459-471, 2016.
|