Keyword : KCipher-2


Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure
Takafumi HIBIKI Naofumi HOMMA Yuto NAKANO Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Yutaka MIYAKE Takafumi AOKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1 ; pp. 157-166
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
side-channel attacksKCipher-2correlation power analysisrandom masking
 Summary | Full Text:PDF

Fast Implementation of KCipher-2 for Software and Hardware
Yuto NAKANO Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Tsukasa ISHIGURO Yutaka MIYAKE Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/01/01
Vol. E97-D  No. 1 ; pp. 43-52
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
stream cipherKCipher-2software implementationhardware implementation
 Summary | Full Text:PDF