Differential Fault Analysis of SHA-3
- 28 November 2015
- book chapter
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableThis publication has 32 references indexed in Scilit:
- Differential Cryptanalysis of Keccak VariantsLecture Notes in Computer Science, 2013
- A Differential Fault Attack on MICKEY 2.0Lecture Notes in Computer Science, 2013
- Differential fault analysis of AES: towards reaching its limitsJournal of Cryptographic Engineering, 2012
- Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256Lecture Notes in Computer Science, 2011
- Differential Fault Analysis on DES Middle RoundsLecture Notes in Computer Science, 2009
- A Differential Fault Attack Against Early Rounds of (Triple-)DESLecture Notes in Computer Science, 2004
- A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KhazadLecture Notes in Computer Science, 2003
- Differential Fault Analysis on A.E.SLecture Notes in Computer Science, 2003
- On the security of iterated message authentication codesIEEE Transactions on Information Theory, 1999
- Differential fault analysis of secret key cryptosystemsLecture Notes in Computer Science, 1997