Sign in

Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA.

Francisco Eugenio Potestad-OrdóñezManuel Valencia-BarreroCarmen Baena OlivaPilar Parra FernándezCarlos Jesús Jiménez-Fernández
Published in: Sensors (2020)
Keyphrases
  • stream cipher
  • secret key
  • similarity measure
  • data distribution
  • cost effective
  • security protocols