The MICKEY 128 (Mutual Irregular Clocking KEY stream generator with a 128-bit key) is a stream cipher designed in response to the ECRYPT 'Call for Stream Cipher Primitives' in 2005. For many applications, these implementations need to be resistant against side channel attacks, means; it should not be too easy to extract secret information from physical measurements on the device. This paper presents the results of differential power analysis attack against MICKEY 128 stream cipher hardware implementation. Our attack is targeted against an FPGA implementation of the MICKEY 128 on SPARTAN 3E. © 2010 IEEE.
cited By (since 1996)0; Conference of org.apache.xalan.xsltc.dom.DOMAdapter@474471c6 ; Conference Date: org.apache.xalan.xsltc.dom.DOMAdapter@5e89a2b7 Through org.apache.xalan.xsltc.dom.DOMAdapter@1e19ccde; Conference Code:81988
S. Sandeep and Rajesh, C. B., “Differential power analysis on FPGA implementation of MICKEY 128”, in Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010, Chengdu, 2010, vol. 9, pp. 667-671.