the round key RK 23 [0] can be calculated, and using the key schedule algorithm, p.23 ,
3] is known from the previous phase, X 23 [2] can be calculated with (X 23 ,
Differential fault analysis of secret key cryptosystems, Advances in Cryptology CRYPTO '97, pp.513-525, 1997. ,
DOI : 10.1007/BFb0052259
Security Evaluation of the Block Cipher LEA, 2011. ,
On the Importance of Checking Cryptographic Protocols for Faults, Proceedings of the 16th Annual International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT'97, pp.37-51, 1997. ,
DOI : 10.1007/3-540-69053-0_4
Attacking Block Ciphers, Fault Analysis in Cryptography, Information Security and Cryptography, pp.19-35, 2012. ,
DOI : 10.1007/978-3-642-29656-7_2
URL : https://hal.archives-ouvertes.fr/hal-00947669
Integrating the EPCIS and Building Automation System into the Internet of Things: a Lightweight and Interoperable Approach, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.56-73, 2015. ,
LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors, Information Security Applications, pp.3-27, 2014. ,
DOI : 10.1007/978-3-319-05149-9_1
Differential Fault Analysis of the Block Cipher LEA, Journal of the Korea Institute of Information Security and Cryptology, vol.24, issue.6, pp.1117-1127, 2014. ,
An IoT based reference architecture for smart water management processes, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol.6, issue.1, pp.4-23, 2015. ,
Differential Fault Analysis on the Families of SIMON and SPECK Ciphers, 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.40-48, 2014. ,
DOI : 10.1109/FDTC.2014.14