Annihilators through fault injection analysis on selected stream ciphers
Algebraic attacks on stream cipher are important in cryptanalysis to both design- ers and attackers. Generally, complexity of an algebraic attack will increase as the degree of an equation increases. In conducting this attack, we aim to decrease the degree of the targeted boolean equation by...
| Main Author: | Omar @ Othman, Wan Zariman |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/85011/ http://psasir.upm.edu.my/id/eprint/85011/1/IPM%202019%2024%20-%20IR.pdf |
Similar Items
Mathematical aspects of selected block ciphers
by: Alqarni, Yazeed Saeed
Published: (2015)
by: Alqarni, Yazeed Saeed
Published: (2015)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
Efficient dynamic DNA-based block cipher algorithm
by: Chng, Chern Wei
Published: (2023)
by: Chng, Chern Wei
Published: (2023)
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
Dynamic determinant matrix-based block cipher algorithm
by: Juremi, Julia
Published: (2018)
by: Juremi, Julia
Published: (2018)
Findings Annihilator(s) via Fault Injection Analysis (FIA) on Boolean Function of LILI-128
by: Omar @ Othman, Wan Zariman, et al.
Published: (2020)
by: Omar @ Othman, Wan Zariman, et al.
Published: (2020)
Musical Cryptography: Codes, Ciphers, Form, and Function
by: Thompson, Benjamin
Published: (2024)
by: Thompson, Benjamin
Published: (2024)
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
by: Hamdi, Ayman Majid
Published: (2019)
by: Hamdi, Ayman Majid
Published: (2019)
Some statistical simulation results over the 128-bit block cipher CLEFIA
by: Rezaeipour, Davood, et al.
Published: (2009)
by: Rezaeipour, Davood, et al.
Published: (2009)
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
Understanding viewer behaviors in live streaming:
the investigations on social live streaming service in
China
by: Guan, Zhengzhi
Published: (2020)
by: Guan, Zhengzhi
Published: (2020)
The continuity of monadic stream functions
by: Capretta, Venanzio, et al.
Published: (2017)
by: Capretta, Venanzio, et al.
Published: (2017)
The continuity of monadic stream functions
by: Capretta, Venanzio, et al.
Published: (2017)
by: Capretta, Venanzio, et al.
Published: (2017)
Reefs of rubbish: the ecological implications of anthropogenic litter in streams
by: Wilson, Hazel
Published: (2021)
by: Wilson, Hazel
Published: (2021)
The Future of TV opportunities IPTV is facilitating for novel revenue streams
by: Insley, Matthew James
Published: (2007)
by: Insley, Matthew James
Published: (2007)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
Stream corridor restoration study on JUNJUNG river, PENANG / Jamil Matarul
by: Matarul, Jamil
Published: (2006)
by: Matarul, Jamil
Published: (2006)
Elaboration likelihood model perspective on millenial live streaming buyers' impulsive buying tendency
by: Luo, Xi
Published: (2023)
by: Luo, Xi
Published: (2023)
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
by: Asaad Aref, Ibrahim
Published: (2004)
by: Asaad Aref, Ibrahim
Published: (2004)
Value Stream Mapping and Flexible Manufacturing at Crown Holdings INC
by: Fraser, Dougal
Published: (2005)
by: Fraser, Dougal
Published: (2005)
How does e-commerce live streaming in China affect consumers’ purchasing intentions?
by: Miao, Yihe
Published: (2024)
by: Miao, Yihe
Published: (2024)
Block and stream cipher
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023)
by: Yusof, Siti Nabilah
Published: (2023)
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
by: Mohd Ali, Fakariah Hani
Published: (2004)
by: Mohd Ali, Fakariah Hani
Published: (2004)
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)
by: Asbullah, Muhammad Asyraf
Published: (2015)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)
by: Daud, Muhamad Azlan
Published: (2014)
New vulnerabilities upon Grain v0 Boolean function through fault injection analysis
by: Omar@Othman, Wan Zariman, et al.
Published: (2021)
by: Omar@Othman, Wan Zariman, et al.
Published: (2021)
The productivity of polymorphic stream equations and the composition of circular traversals
by: Balestrieri, Florent
Published: (2015)
by: Balestrieri, Florent
Published: (2015)
Side channel analysis on AAᵝ cryptosystem and a signing scheme based on bivariate function hard problem and discrete logarithm problem
by: Abd Ghafar, Amir Hamzah
Published: (2015)
by: Abd Ghafar, Amir Hamzah
Published: (2015)
Trivium and Rabbit stream cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Streams, Grants and Pools: Stakeholding, Asset-Based Welfare and Convertibility
by: Fitzpatrick, Tony
Published: (2007)
by: Fitzpatrick, Tony
Published: (2007)
Stream Quantiles via Maximal Entropy Histograms
by: Arandjelovic, O., et al.
Published: (2014)
by: Arandjelovic, O., et al.
Published: (2014)
Event composition and detection in data stream management systems
by: Mohania, M., et al.
Published: (2005)
by: Mohania, M., et al.
Published: (2005)
Investigating the impact of e-commerce live streaming on consumers'purchase intention in China
by: ZHANG, TAO
Published: (2022)
by: ZHANG, TAO
Published: (2022)
Optimization algorithms for multipath transfer over asymmetric paths using concurrent multipath transfer stream control transmission protocol
by: Abass, Abdulridha Hanash
Published: (2016)
by: Abass, Abdulridha Hanash
Published: (2016)
What drives people to purchase virtual gifts in live streaming? The mediating role of flow
by: Li, Boying, et al.
Published: (2018)
by: Li, Boying, et al.
Published: (2018)
New directions in forging multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
Fault Analysis of the KATAN Family of Block Ciphers
by: Abdul Latip, Shekh Faisal
Published: (2012)
by: Abdul Latip, Shekh Faisal
Published: (2012)
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
Similar Items
-
Mathematical aspects of selected block ciphers
by: Alqarni, Yazeed Saeed
Published: (2015) -
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012) -
Efficient dynamic DNA-based block cipher algorithm
by: Chng, Chern Wei
Published: (2023) -
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010) -
Dynamic determinant matrix-based block cipher algorithm
by: Juremi, Julia
Published: (2018)