Results 1 to 10 of about 12,269 (258)
Fault Template Attack Based on Fault Probability
Template attack uses leaked information from various side channels and may break out the countermeasures embedded in the algorithm, which is considered a powerful side-channel attack method.
Tong Wu, Dawei Zhou, Lei Du, Shiwei Wang
doaj +2 more sources
Hardware Countermeasures Benchmarking against Fault Attacks [PDF]
The development of differential fault analysis (DFA) techniques and mechanisms to inject faults into cryptographic circuits brings with it the need to use protection mechanisms that guarantee the expected level of security. The AES cipher, as a standard,
Francisco Eugenio Potestad-Ordóñez +4 more
doaj +3 more sources
Persistent Fault Attack in Practice
Persistence fault analysis (PFA) is a novel fault analysis technique proposed in CHES 2018 and demonstrated with rowhammer-based fault injections. However, whether such analysis can be applied to traditional fault attack scenario, together with its ...
Fan Zhang +8 more
doaj +3 more sources
Differential fault attack on FeW
In order to evaluate the security of the lightweight block cipher FeW,a differential fault attack method was proposed and discussed using a single byte random fault model.In this method,a single byte random fault was introduced on the right side of the ...
Min XIE, Jiaqi LI, Feng TIAN
doaj +3 more sources
Grain-128AEAD is a lightweight authenticated encryption stream cipher and one of the finalists in the National Institute of Standards and Technology (NIST) Lightweight Cryptography (LWC) project. This paper provides an independent third-party analysis of
Iftekhar Salam +5 more
doaj +1 more source
Differential fault attack on LiCi cipher
LiCi lightweight block cipher is a new algorithm proposed in 2017.With advantages of small structure and low energy consumption, LiCi is more suitable for resource-constrained environments such as the internet of things (IoT).In the design document of ...
Weijian CHEN, Haoxiang LUO
doaj +3 more sources
Fault-Aware Adversary Attack Analyses and Enhancement for RRAM-Based Neuromorphic Accelerator
Neural networks have been widely deployed in sensor networks and IoT systems due to the advance in lightweight design and edge computing as well as emerging energy-efficient neuromorphic accelerators.
Liuting Shang +3 more
doaj +1 more source
Algebraic Fault Attack Against SIMECK Cipher Based on Optimized Fault Location [PDF]
This paper proposes a algebraic fault attack method based on optimized fault location against SIMECK cipher.By analyzing encryption diffusion defect of the SIMECK round function and the failure cause,the deterministic propagation characteristics of ...
HUANG Changyang, WANG Tao, WANG Xiaohan, CHEN Qingchao, YIN Shizhuang
doaj +1 more source
Differential Fault Attack Method on SM4 Based on Random Fault Injection [PDF]
In the existing researches,a fault is often required to be injected into a byte of a fixed position,and then special wrong ciphertext is obtained to carry out attacks.This assumption is difficult to achieve in the actual attack,so a differential fault ...
RONG Xuefang,WU Zhen,WANG Min,DU Zhibo,RAO Jintao
doaj +1 more source
Based on the discrete event-triggered communication scheme (DETCS), a codesign method of dual security control and communication for the non-linear cyberphysical system (CPS) with denial-of-service (DoS) attack and actuator fault is studied under multi ...
Li Zhao, Wei Li, Yajie Li
doaj +1 more source

