Toward reverse engineering on secret \(S\)-boxes in block ciphers
From MaRDI portal
Publication:893703
DOI10.1007/S11432-013-5053-9zbMath1357.94076OpenAlexW2152497256WikidataQ122923055 ScholiaQ122923055MaRDI QIDQ893703
Ming Tang, Mu Yi, Hongbo Peng, Zhenlong Qiu, Huanguo Zhang, Xiaobo (Sharon) Hu
Publication date: 20 November 2015
Published in: Science China. Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11432-013-5053-9
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Dual-rail transition logic: A logic style for counteracting power analysis attacks
- Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems
- SCARE of Secret Ciphers with SPN Structures
- Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes
- Cryptanalysis of C2
- Defeating Any Secret Cryptography with SCARE Attacks
- SCARE of the DES
- Applied Cryptography and Network Security
- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms
- Topics in Cryptology – CT-RSA 2004
This page was built for publication: Toward reverse engineering on secret \(S\)-boxes in block ciphers