Results 11 to 20 of about 12,269 (258)
Parametric Analyses of Attack-Fault Trees [PDF]
Risk assessment of cyber-physical systems, such as power plants, connected devices and IT-infrastructures has always been challenging: safety (i. e., absence of unintentional failures) and security (i. e., no disruptions due to attackers) are conditions that must be guaranteed.
André, Étienne +3 more
openaire +6 more sources
Fault attacks on authenticated encryption modes for GIFT
There are several authenticated encryption modes for block cipher GIFT in the NIST lightweight cryptography standardisation process. In this study, the authors research on the fault attacks on this kind of authenticated encryption modes and mainly ...
Shuai Liu, Jie Guan, Bin Hu
doaj +1 more source
Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition
Recently, as the number of IoT (Internet of Things) devices has increased, the use of lightweight cryptographic algorithms that are suitable for environments with scarce resources has also increased.
Seonghyuck Lim +2 more
doaj +1 more source
Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis
Lightweight block ciphers are normally used in low-power resource-constrained environments, while providing reliable and sufficient security. Therefore, it is important to study the security and reliability of lightweight block ciphers.
Xing Fang +4 more
doaj +1 more source
In this study, a co-design method of dual security control and communication is investigated for a nonlinear cyber–physical system (CPS) with an actuator fault and false data injection (FDI) attacks.
Li Zhao, Wei Li, YaJie Li
doaj +1 more source
When the Decoder Has to Look Twice: Glitching a PUF Error Correction
Physical Unclonable Functions (PUFs) have been increasingly used as an alternative to non-volatile memory for the storage of cryptographic secrets. Research on side channel and fault attacks with the goal of extracting these secrets has begun to gain ...
Jonas Ruchti +2 more
doaj +1 more source
Fault-Enabled Chosen-Ciphertext Attacks on Kyber [PDF]
NIST's PQC standardization process is in the third round, and a first final choice between one of three remaining lattice-based key encapsulation mechanisms is expected by the end of 2021. This makes studying the implementation-security aspect of the candidates a pressing matter.
Hermelink, Julius +2 more
openaire +1 more source
With the recent development of the Internet of Things (IoT), related device use is increasing rapidly. As a result, accessing and hijacking the devices is an increasing security threat.
Seonghyuck Lim +2 more
doaj +1 more source
Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber
At Indocrypt 2021, Hermelink, Pessl, and Pöppelmann presented a fault attack against Kyber in which a system of linear inequalities over the private key is generated and solved.
Jeroen Delvaux
doaj +3 more sources
Co-Design of Dual Security Control and Communication for Nonlinear CPS Under DoS Attack
The less conservative co-design problem of dual security control and communication for CPS was studied for a class of nonlinear CPS with an actuator fault and DoS attack based on the DETCS. First, combining with the edge computing thought, data filtering
Li Zhao, Wei Li
doaj +1 more source

