Strumok keystream generator
I Gorbenko, O Kuznetsov, Y Gorbenko… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
This work presents the main results of development of a new keystream generator, which is
named “Strumok”, and offered as a candidate for the national symmetric encryption standard …
named “Strumok”, and offered as a candidate for the national symmetric encryption standard …
Trivium stream cipher countermeasures against fault injection attacks and DFA
Attacks on cryptocircuits are becoming increasingly sophisticated, requiring designers to
include more and more countermeasures in the design to protect it against malicious …
include more and more countermeasures in the design to protect it against malicious …
Cryptanalysis of two fault countermeasure schemes
In this paper, we look at two fault countermeasure schemes proposed very recently in
literature. The first proposed in ACISP 2015 constructs a transformation function using a …
literature. The first proposed in ACISP 2015 constructs a transformation function using a …
Stigmergy-based security for SoC operations from runtime performance degradation of SoC components
The semiconductor design industry of the embedded era has embraced the globalization
strategy for system on chip (SoC) design. This involves incorporation of various SoC …
strategy for system on chip (SoC) design. This involves incorporation of various SoC …
Hardware Design of Lightweight Stream Cipher PUFFIN Algorithm for Anti-cooperation
DW Wang, ZH Zhang, LJ Wu… - 2018 12th IEEE …, 2018 - ieeexplore.ieee.org
With the development of the Internet of Things (IoT), the application of micro-computing
strips, such as RFID chips and wireless sensor networks, has become more and more …
strips, such as RFID chips and wireless sensor networks, has become more and more …