版权说明 操作指南
首页 > 成果 > 详情

Power Analysis Attack on a Lightweight Block Cipher GIFT

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
会议论文
作者:
Zhang J.;Li L.;Li Q.;Zhao J.;Liang X.
通讯作者:
Zhang, J.
作者机构:
[Liang X.; Li Q.; Zhao J.; Zhang J.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China
Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China
[Li L.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China, Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China
通讯机构:
[Zhang, J.] C
College of Computer Science and Technology, China
语种:
英文
关键词:
GIFT;Lightweight block cipher;Power analysis attack;SAKURA-G
期刊:
Advances in Intelligent Systems and Computing
ISSN:
2194-5357
年:
2021
卷:
1143
页码:
565-574
会议名称:
9th International Conference on Computer Engineering and Networks, CENet2019
会议时间:
18 October 2019 through 20 October 2019
主编:
Liu Q.Liu X.Li L.Zhao H.-H.Zhou H.
出版者:
Springer
ISBN:
9789811537523
基金类别:
This research is supported by the Science Foundation Project of Hengyang Normal University (18A14), National Natural Science Foundation of China under Grant No. 61572174, Application-oriented Special Disciplines. The Double First-Class University Project of Hunan Province is supported by Hunan Province Office of Education (Xiangjiaotong [2018] 469), Hunan Province Special Funds of Central Government for Guiding Local Science and Technology Development No. 2018CT5001, Hunan Provincial Natural Science Foundation of China with Grant No. 2019JJ60004, the Science and Technology Plan Project of Hunan Province No. 2016TP1020, Subject group construction project of Hengyang Normal University No. 18XKQ02.
机构署名:
本校为第一机构
院系归属:
计算机科学与技术学院
摘要:
GIFT is a new lightweight block cipher with smaller area and higher efficiency, which is very suitable for the Internet of Things (IoT) devices with constrained resources. The power analysis attack is an efficient method to extract the key from the cryptographic equipment. However, it is not easy to reveal the key by means of power analysis attack, when the cipher is implemented by hardware. In this article, we present the method of power analysis attack against GIFT. Firstly, we implemented GIFT on FPGA using the SAKURA-G board. Then, we explo...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com