Results 1 to 10 of about 12,269 (258)

Fault Template Attack Based on Fault Probability

open access: yesIEEE Access, 2023
Template attack uses leaked information from various side channels and may break out the countermeasures embedded in the algorithm, which is considered a powerful side-channel attack method.
Tong Wu, Dawei Zhou, Lei Du, Shiwei Wang
doaj   +2 more sources

Hardware Countermeasures Benchmarking against Fault Attacks [PDF]

open access: yesApplied Sciences, 2022
The development of differential fault analysis (DFA) techniques and mechanisms to inject faults into cryptographic circuits brings with it the need to use protection mechanisms that guarantee the expected level of security. The AES cipher, as a standard,
Francisco Eugenio Potestad-Ordóñez   +4 more
doaj   +3 more sources

Persistent Fault Attack in Practice

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Persistence fault analysis (PFA) is a novel fault analysis technique proposed in CHES 2018 and demonstrated with rowhammer-based fault injections. However, whether such analysis can be applied to traditional fault attack scenario, together with its ...
Fan Zhang   +8 more
doaj   +3 more sources

Differential fault attack on FeW

open access: yesTongxin xuebao, 2020
In order to evaluate the security of the lightweight block cipher FeW,a differential fault attack method was proposed and discussed using a single byte random fault model.In this method,a single byte random fault was introduced on the right side of the ...
Min XIE, Jiaqi LI, Feng TIAN
doaj   +3 more sources

Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD

open access: yesIEEE Access, 2021
Grain-128AEAD is a lightweight authenticated encryption stream cipher and one of the finalists in the National Institute of Standards and Technology (NIST) Lightweight Cryptography (LWC) project. This paper provides an independent third-party analysis of
Iftekhar Salam   +5 more
doaj   +1 more source

Differential fault attack on LiCi cipher

open access: yes网络与信息安全学报, 2021
LiCi lightweight block cipher is a new algorithm proposed in 2017.With advantages of small structure and low energy consumption, LiCi is more suitable for resource-constrained environments such as the internet of things (IoT).In the design document of ...
Weijian CHEN, Haoxiang LUO
doaj   +3 more sources

Fault-Aware Adversary Attack Analyses and Enhancement for RRAM-Based Neuromorphic Accelerator

open access: yesFrontiers in Sensors, 2022
Neural networks have been widely deployed in sensor networks and IoT systems due to the advance in lightweight design and edge computing as well as emerging energy-efficient neuromorphic accelerators.
Liuting Shang   +3 more
doaj   +1 more source

Algebraic Fault Attack Against SIMECK Cipher Based on Optimized Fault Location [PDF]

open access: yesJisuanji gongcheng, 2019
This paper proposes a algebraic fault attack method based on optimized fault location against SIMECK cipher.By analyzing encryption diffusion defect of the SIMECK round function and the failure cause,the deterministic propagation characteristics of ...
HUANG Changyang, WANG Tao, WANG Xiaohan, CHEN Qingchao, YIN Shizhuang
doaj   +1 more source

Differential Fault Attack Method on SM4 Based on Random Fault Injection [PDF]

open access: yesJisuanji gongcheng, 2016
In the existing researches,a fault is often required to be injected into a byte of a fixed position,and then special wrong ciphertext is obtained to carry out attacks.This assumption is difficult to achieve in the actual attack,so a differential fault ...
RONG Xuefang,WU Zhen,WANG Min,DU Zhibo,RAO Jintao
doaj   +1 more source

Research on Dual Security Control for a Non-Linear CPS with Multi-Objective Constraints under DoS Attack and Actuator Fault: An Active-Passive Attack-Tolerant Approach

open access: yesJournal of Control Science and Engineering, 2022
Based on the discrete event-triggered communication scheme (DETCS), a codesign method of dual security control and communication for the non-linear cyberphysical system (CPS) with denial-of-service (DoS) attack and actuator fault is studied under multi ...
Li Zhao, Wei Li, Yajie Li
doaj   +1 more source

Home - About - Disclaimer - Privacy