Strumok keystream generator

I Gorbenko, O Kuznetsov, Y Gorbenko… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
This work presents the main results of development of a new keystream generator, which is
named “Strumok”, and offered as a candidate for the national symmetric encryption standard …

Trivium stream cipher countermeasures against fault injection attacks and DFA

FE Potestad-Ordóñez, E Tena-Sánchez… - IEEE …, 2021 - ieeexplore.ieee.org
Attacks on cryptocircuits are becoming increasingly sophisticated, requiring designers to
include more and more countermeasures in the design to protect it against malicious …

Cryptanalysis of two fault countermeasure schemes

S Banik, A Bogdanov - Progress in Cryptology--INDOCRYPT 2015: 16th …, 2015 - Springer
In this paper, we look at two fault countermeasure schemes proposed very recently in
literature. The first proposed in ACISP 2015 constructs a transformation function using a …

Stigmergy-based security for SoC operations from runtime performance degradation of SoC components

K Guha, D Saha, A Chakrabarti - ACM Transactions on Embedded …, 2019 - dl.acm.org
The semiconductor design industry of the embedded era has embraced the globalization
strategy for system on chip (SoC) design. This involves incorporation of various SoC …

Hardware Design of Lightweight Stream Cipher PUFFIN Algorithm for Anti-cooperation

DW Wang, ZH Zhang, LJ Wu… - 2018 12th IEEE …, 2018 - ieeexplore.ieee.org
With the development of the Internet of Things (IoT), the application of micro-computing
strips, such as RFID chips and wireless sensor networks, has become more and more …