SCIENCE CHINA Information Sciences, Volume 61, Issue 3: 039106(2018) https://doi.org/10.1007/s11432-017-9179-4

Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers

More info
  • ReceivedApr 22, 2017
  • AcceptedJun 7, 2017
  • PublishedJan 5, 2018


There is no abstract available for this article.


This work was supported in part by National Natural Science Foundation of China (Grant Nos. 61309021, 61472357, 61571063, 61572028), China Scholarship Council (Grant No. 201606325012), and Project of Science and Technology of Guangdong Province (Grant Nos. 2014A030313439, 2016B010125002).


Appendix A.


[1] Bhunia S, Hsiao M, Banga M, et al. Hardware trojan attacks: threat analysis and countermeasures. Proc IEEE, 2014, 102: 1229--1247. Google Scholar

[2] Johnson A, Saha S, Chakraborty R, et al. Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet. In: Proceedings of the 9th Workshop on Embedded Systems Security, New Delhi, 2014. 1--8. Google Scholar

[3] Biham E, Shamir A. Differential fault analysis of secret key cryptosystem. In: Proceedings of the 36th International Cryptology Conference. Berlin: Springer, 1997. 513--525. Google Scholar

[4] Bogdanov A, Knudsen L R, Leander G, et al. PRESENT: an ultra-lightweight block cipher. In: Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, 2007. 450--466. Google Scholar

[5] Zhang F, Zhao X J, Guo S Z, et al. Improved algebraic fault analysis: a case study on piccolo and applications to other lightweight block ciphers. In: Proceedings of the 4th International Conference on Constructive Side-Channel Analysis and Secure Design, Paris, 2013. 62--79. Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有