Citation: | GAO Si, CHEN Hua, FAN Limin, WU Wenling. Improved Fault Attack on LBlock: Earlier Injection with No Extra Faults[J]. Chinese Journal of Electronics, 2017, 26(4): 754-759. doi: 10.1049/cje.2017.04.007 |
W.L. Wu and L. Zhang, “LBlock: A lightweight block cipher”, Applied Cryptography and Network Security, Lecture Notes in Computer Science (LNCS), Vol.6715, pp.327-344, 2011.
|
L. Wen, M.Q. Wang and J.Y. Zhao, “Related-key impossible differential attack on reduced-round LBlock”, Journal of Computer Science and Technology, Vol.29, No.1, pp.165-176, 2014.
|
Y. Liu, D.W. Gu, Z.Q. Liu, et al., “Impossible differential attacks on reduced-round LBlock”, 8th International Conference on Information Security Practice and Experience, ISPEC 2012, Hangzhou, China, LNCS, Vol.7232, pp.97-108, 2012.
|
S. Emami, C. McDonald, J. Pieprzyk, et al., “Truncated differential analysis of reduced-round LBlock”, 12th International Conference on Cryptology and Network Security, CANS 2013, Paraty, Brazil, LNCS, Vol.8257, pp.291-308, 2013.
|
F. Karakoc, H. Demirci and A.E. Harmanci, “Biclique cryptanalysis of LBlock and TWINE”, Information Processing Letters, Vol.113, No.12, pp.423-429, 2013.
|
Y. Sasaki and L. Wang, “Comprehensive study of integral analysis on 22-round LBlock”, 15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Republic of Korea, LNCS, Vol.7839, pp.156-169, 2013.
|
S.W. Sun, L. Hu, P. Wang, et al., “Automatic security evaluation and (related-key) differential characteristic search: Application to SIMON, PRESENT, LBlock, DES(L) and other bitoriented block ciphers”, Advances in Cryptology—ASIACRYPT 2014, LNCS, Vol.8873, pp.158-178, 2014.
|
Y.Z. Wei, C.M. Su and C.B. Ma, “A meet-in-the-middle attack on the LBlock cipher”, Conference Anthology, IEEE, Guangxi, China, pp.1-3, 2013.
|
Z.Q. Li, B. Zhang, Y. Yao, et al., “Cube cryptanalysis of LBlock with noisy leakage”, 15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, LNCS, Vol.7839, pp.141-155, 2012.
|
C.Y. Peng, C.Y. Zhu, L. Huang, et al., “Extended algebraicside channel attack and its application”, Chinese Journal of Electronics, Vol.41, No.5, pp.859-864, 2013.
|
D. Boneh, R. DeMillo and R. Lipton, “On the importance of checking cryptographic protocols for faults”, Advances in Cryptology EUROCRYPT97, LNCS, Vol.1233, pp.37-51, 1997.
|
E. Biham and A. Shamir, “Differential fault analysis of secret key cryptosystems”, Advances in Cryptology—CRYPTO 97, LNCS, Vol.1294, pp.513-525, 1997.
|
L. Hemme, “A differential fault attack against early rounds of (triple-)DES”, Cryptographic Hardware and Embedded Systems—CHES 2004, LNCS, Vol.3156, pp.254-267, 2004.
|
P. Dusart, G. Letourneux and O. Vivolo, “Differential fault analysis on A.E.S”, Applied Cryptography and Network Security, LNCS, Vol.2846, pp.293-306, 2003.
|
C. Giraud, “DFA on AES”. Advanced Encryption Standard—AES, LNCS, Vol.3373, pp.27-41, 2005.
|
P. Derbez, P.A. Fouque and D. Leresteux, “Meet-in-the-middle and impossible differential fault analysis on AES”, Cryptographic Hardware and Embedded Systems—CHES 2011, LNCS, Vol.6917, pp.274-291, 2011.
|
H. Chen, W.L. Wu and D. Feng, “Differential Fault Analysis on CLEFIA”, Information and Communications Security, LNCS, Vol.4861, pp.284-295, 2007.
|
J. Takahashi and T. Fukunaga, “Improved differential fault analysis on CLEFIA”, 5th International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2008, Washington, DC, United States, pp.25-34, 2008.
|
Y.B. Zhou, W.L. Wu, N.N. Xu, et al., “Differential fault attack on camellia”. Chinese Journal of Electronics, Vol.18, No.1, pp.13-19, 2009.
|
L. Zhao, T. Nishide and K. Sakurai, “Differential fault analysis of full LBlock”, Constructive Side-Channel Analysis and Secure Design, LNCS, Vol.7275, pp.135-150, 2012.
|
H. Chen and L. Fan, “Integral based fault attack on LBlock”,16th Annual International Conference on Information Security and Cryptology, Seoul, Korea, pp.227-240, 2013.
|
F. Zhang, X.J. Zhao, S.Z. Guo, et al., “Improving fault analysis on LBlock with algebraic technique”, Chinese Association for Cryptologic Research 2013 Annual Conference, Fu Zhou, China, pp. 172-187, 2014. (in Chinese).
|
K. Jeong, C. Lee and J. Lim, “Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks”, EURASIP Journal on Wireless Communications and Networking, Vol.2013, No.1, pp.1-9, 2013.
|