Citation: | ZHANG Wenying, “A Differential Fault Analysis Attack Against the Light Weight PRINTcipher,” Chinese Journal of Electronics, vol. 25, no. 6, pp. 1019-1024, 2016, doi: 10.1049/cje.2016.10.002 |
L. Knudsen, G. Leander, A. Poschmann, et al., "PRINTcipher: A block cipher for IC-Printing", Workshop on Cryptographic Hardware and Embedded Systems'2010, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Vol.6225, pp.16-32, 2010.
|
M.A. Abdelraheem, G. Leander and E. Zenner, "Differential cryptanalysis of round-reduced PRINTcipher: Computing roots of permutations", Fast Software Encryption'2011, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Vol.6733, pp.1-7, 2011.
|
G. Leander, M.A. Abdelraheem, H. AlKhzaimi, et al., "A cryptanalysis of PRINTCipher: The invariant coset attack", Advances in Cryptology'2011, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Vol.6841, pp.206-261, 2011.
|
M. Gomathisankaran and R.B. Lee, "Maya: A novel block encryption function", Proceedings of the International Workshop on Coding and Cryptography 2009, http://palms.princeton.edu/system/files/maya,2010-2-14.
|
J. Borghoff, L.R. Knudsen, G. Leander, et al., "Slender-set differential cryptanalysis", Journal of Cryptology, Vol.26, No.1, pp.11-18, 2013.
|
G. Liu and C. Jin, "Differential cryptanalysis of PRESENTlike cipher", Designs, Codes and Cryptography, Vol.76, No.3, pp.385-408, 2015.
|
G. Liu, C. Jin and C. Qi, "Improved slender-set linear cryptanalysis", Fast Software Encryption'2014, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Vol.8540, pp.431-450, 2014
|
J. Blomer and J.P. Seifert, "Fault based cryptanalysis of the Advanced Encryption Standard (AES)", Financial Cryptography'2003, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Vol.2742, pp.162-181, 2003.
|
E. Biham and A. Shamir, "Differential cryptanalysis of DES-like cryptosystems", Journal of Cryptology, Vol.4, No.1, pp.3-72, 1991.
|
M. Hojsík and B. Rudolf, "Differential fault analysis of Trivium", Fast Software Encryption'2008, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Vol.5086, pp.158-172, 2008.
|
L. Breveglieri, I. Koren and P. Maistri, "A fault attack against the FOX cipher family", Fault Diagnosis and Tolerance in Cryptography'2006, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Vol.4236, pp.98-105, 2006.
|
G. Bertoni, L. Breveglieri, I. Koren, et al., "Error analysis and detection procedures for a hardware implementation of the advanced encryption standard", IEEE Transactions on Computers, Vol.52, No.4, pp.492-505, 2003.
|
Y. Zhou, W. Wu, N. Xu, et al., "Differential fault attack on Camellia", Chinese Journal of Electronics, Vol.18, No.1, pp.13-19, 2009.
|
B. Sun, P. Zhang, C. Li, et al., "Higher order integral cryptanalysis of Zodiac", Chinese Journal of Electronics, Vol.22, No.2, pp.589-593, 2013.
|
X. Zhao, T. Wang and S. Guo, "Fault-propagate pattern based DFA on PRESENT and PRINTcipher", Wuhan University Journal of Natural Sciences, Vol.17, No.6, pp.485-493, 2012.
|
N. Bagheri, R. Ebrahimpour and N. Ghaedi, "Differential fault analysis on PRINTcipher", IET Networks, Vol.2, No.1, pp.30-36, 2013.
|