Results 211 to 220 of about 12,269 (258)
Some of the next articles are maybe not open access.
2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010
This paper introduces some new types of optical fault attacks called fault masking attacks. These attacks are aimed at disrupting of the normal memory operation through preventing changes of the memory contents. The technique was demonstrated on an EEPROM and Flash memory inside PIC microcontrollers.
openaire +1 more source
This paper introduces some new types of optical fault attacks called fault masking attacks. These attacks are aimed at disrupting of the normal memory operation through preventing changes of the memory contents. The technique was demonstrated on an EEPROM and Flash memory inside PIC microcontrollers.
openaire +1 more source
Introduction to side-channel attacks and fault attacks
2016 Asia-Pacific International Symposium on Electromagnetic Compatibility (APEMC), 2016Side-channel attacks and fault attacks use the physical interactions with cryptographic devices to achieve the shortcuts of recovering the secret key. For side-channel attacks, physical information leakage during the cryptographic calculation is measured and statistically analyzed to reveal the intermediate values.
Yang Li, Mengting Chen, Jian Wang
openaire +1 more source
Differential Fault Attack on SIMECK
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, 2016In 2013, researchers from the National Security Agency of the USA (NSA) proposed two lightweight block ciphers SIMON and SPECK [3]. While SIMON is tuned for optimal performance in hardware, SPECK is tuned for optimal performance in software. At CHES 2015, Yang et al. [6] combined the "good" design components from both SIMON and SPECK and proposed a new
Venu Nalla +2 more
openaire +1 more source
Journal of Hardware and Systems Security, 2020
SKINNY is a family of tweakable lightweight block ciphers, proposed in CRYPTO 2016. The proposal of SKINNY describes two block size variants of 64 and 128 bits as well as three options for tweakey. In this paper, we present fault attacks (FA) on all SKINNY variants. In the first part of the paper, we propose differential fault analysis (DFA) attacks on
Navid Vafaei +3 more
openaire +1 more source
SKINNY is a family of tweakable lightweight block ciphers, proposed in CRYPTO 2016. The proposal of SKINNY describes two block size variants of 64 and 128 bits as well as three options for tweakey. In this paper, we present fault attacks (FA) on all SKINNY variants. In the first part of the paper, we propose differential fault analysis (DFA) attacks on
Navid Vafaei +3 more
openaire +1 more source
Fault Space Transformation: Countering Biased Fault Attacks
2018In the previous chapter, we have introduced to the readers several examples of countermeasures against differential fault analysis. These countermeasures are all redundancy-based, and use a concurrent error detection mechanism to infer the presence of a fault.
Sikhar Patranabis +3 more
openaire +1 more source
Fault Attack Protection and Evaluation
2020Fault attacks can obstruct the normal system execution by injecting errors into the hardware. By radiating the critical circuit components with high energy particle strikes, voltage transients are created to make the circuit malfunction temporarily. In recent years, fault attacks have demonstrated a great capability of leaking the cryptographics keys ...
Meng Li, David Z. Pan
openaire +1 more source
Logic Locking Induced Fault Attacks
2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2020Logic locking has been presented in the past as a solution to avoid overproduction or product piracy. All solutions so far assume or rely on the protection of the correct locking key. This paper does not target the break of locking schemes but looks at another highly critical security risk which comes with modified locking keys: The enabling of fault ...
Michaela Brunner +3 more
openaire +1 more source
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2009
An advantage of schemes based on elliptic curve cryptography (ECC) is that they require a smaller key size than other public key schemes to guarantee the same level of security. Thus, ECC algorithms are well suited for systems with constrained resources like smart cards or mobile devices.
Jörn-Marc Schmidt, Marcel Medwed
openaire +1 more source
An advantage of schemes based on elliptic curve cryptography (ECC) is that they require a smaller key size than other public key schemes to guarantee the same level of security. Thus, ECC algorithms are well suited for systems with constrained resources like smart cards or mobile devices.
Jörn-Marc Schmidt, Marcel Medwed
openaire +1 more source
Fault Attacks on Cryptographic Circuits
2019 17th IEEE International New Circuits and Systems Conference (NEWCAS), 2019Fault-injection attacks on cryptographic circuits are physical manipulations applied by an adversary during the circuit's operation with the purpose of extracting sensitive information, such as secret key bits. Fault attacks gain in relevance for cyberphysical applications and autonomous systems, where the system's hardware is naturally exposed to a ...
openaire +1 more source
SMS4 Algorithm Algebra Fault Attack
2010 Third International Symposium on Electronic Commerce and Security, 2010SMS4 algorithm packet length and key length is 128bit. This article presents a SMS4 algorithm of byte-oriented theory, algebraic fault attack only need 1 error redaction that we can recover SMS4 of 128bit key.
Hu Zhihua, Liao Xiaoyong
openaire +1 more source

