Results 201 to 210 of about 12,269 (258)
IHBA-optimized DR-SE-NPCNet for robust open-circuit fault diagnosis in three-level NPC inverters under mixed and noisy conditions. [PDF]
Liu Q, Chen C, Ouyang H, Xiao M, Lei W.
europepmc +1 more source
The State of Practice About Security in Telemedicine Systems in Chile: Exploratory Study.
Marquez G +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Faults, Injection Methods, and Fault Attacks
IEEE Design & Test of Computers, 2007An active attacker can induce errors during the computation of the cryptographic algorithm and exploit the faulty results to extract information about the secret key in embedded systems. We call this kind of attack a fault attack. Fault attacks can break an unprotected system more quickly than any other kind of side-channel attack such as simple power ...
Chong Hee Kim, Jean-Jacques Quisquater
openaire +1 more source
Attacking Deterministic Signature Schemes Using Fault Attacks
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018Many digital signature schemes rely on random numbers that are unique and non-predictable per signature. Failures of random number generators may have catastrophic effects such as compromising private signature keys. In recent years, many widely-used cryptographic technologies adopted deterministic signature schemes because they are presumed to be ...
Poddebniak, Damian +4 more
openaire +1 more source
IEEE Embedded Systems Letters, 2018
Fault injection attacks are wide spread in the domain of smart cards and microcontrollers but have not been yet democratized on complex embedded microprocessors, such as system on chip that can be found in smart phones, tablets, and automotive systems.
F. Majeric, B. Gonzalvo, L. Bossuet
openaire +2 more sources
Fault injection attacks are wide spread in the domain of smart cards and microcontrollers but have not been yet democratized on complex embedded microprocessors, such as system on chip that can be found in smart phones, tablets, and automotive systems.
F. Majeric, B. Gonzalvo, L. Bossuet
openaire +2 more sources
Overdrive Fault Attacks on GPUs
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S), 2021Graphics processing units (GPUs) are widely used to accelerate applications including cryptographic operations. The reliability and security of GPUs have become a concern. Prior work reported power and timing side-channel attacks on GPUs. In this paper, we present our project about a new class of fault attacks targeting modern GPUs, the overdrive fault
Majid Sabbagh, Yunsi Fei, David Kaeli
openaire +1 more source
Low voltage fault attacks to AES
2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2010This paper presents a new fault based attack on the Advanced Encryption Standard (AES) with any key length, together with its practical validation through the use of low voltage induced faults. The CPU running the attacked algorithm is the ARM926EJ-S: a 32-bit processor widely deployed in computer peripherals, telecommunication appliances and low power
BARENGHI, ALESSANDRO +4 more
openaire +2 more sources
PRINCE under Differential Fault Attack
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security, 2020Fault analysis is one of the most studied physical attacks primarily due to the inherent ease of implementation. This work investigates integral and differential fault analysis attacks on the well-known lightweight block-cipher PRINCE. The work begins by identifying new integral properties of PRINCE which are not restricted to be symmetric around the ...
null Aikata +2 more
openaire +1 more source
2018
The advent of cloud computing and IoT have heralded an era of unprecedented levels of embedded technology and device connectivity across the globe. However, this raises concerns related to security and privacy. While one alleviate such concerns is to resort to the use of cryptographic modules for secure computation, cryptographic implementations ...
Sikhar Patranabis, Debdeep Mukhopadhyay
openaire +1 more source
The advent of cloud computing and IoT have heralded an era of unprecedented levels of embedded technology and device connectivity across the globe. However, this raises concerns related to security and privacy. While one alleviate such concerns is to resort to the use of cryptographic modules for secure computation, cryptographic implementations ...
Sikhar Patranabis, Debdeep Mukhopadhyay
openaire +1 more source

