Results 221 to 230 of about 12,269 (258)
Some of the next articles are maybe not open access.
Attack-resilient fault detection for interconnected systems under DoS attack
ISA TransactionsIn light of the expanding cyber-space applications, the imperative consideration of cyber-attack ramifications on system security is evident. This paper presents a resilient dynamic event-triggered fault detection scheme for a class of nonlinear interconnected systems subjected to denial of service (DoS) attacks. To counteract multifaceted threats, the
Qidong Liu +3 more
openaire +2 more sources
Fault Attacks on Stream Ciphers
2012In this chapter, we provide an outlook on fault attack techniques aimed at breaking stream ciphers. The chapter will start with an overview of the possible targets for fault attacks among this class of encryption algorithms, and subsequently provide two in-depth case studies on enhancing impossible cryptanalysis against RC4 and differential ...
Alessandro Barenghi, Elena Trichina
openaire +1 more source
2012 IEEE 18th International On-Line Testing Symposium (IOLTS), 2012
True random number generators (TRNGs) are used for cryptographic operations. By the use of TRNGs secret keys can be generated and the design can be made robust against attacks. In order to simplify further attacks the adversary tries to introduce some bias in the probability distribution of the TRNG output. A possibility to detect such attacks is shown
E. Bohl, M. Ihle
openaire +1 more source
True random number generators (TRNGs) are used for cryptographic operations. By the use of TRNGs secret keys can be generated and the design can be made robust against attacks. In order to simplify further attacks the adversary tries to introduce some bias in the probability distribution of the TRNG output. A possibility to detect such attacks is shown
E. Bohl, M. Ihle
openaire +1 more source
Fault Attacks on Signature Schemes
2004In 1996, Bao, Deng, Han, Jeng, Narasimhalu and Ngair presented bit-fault attacks on some signature schemes such as DSA, El Gamal and Schnorr signatures schemes. Unfortunately nowadays, their fault model is still very difficult to apply in practice. In this paper we extend Bao et al.’s attacks on the DSA, the ElGamal and the Schnorr signature by using a
Christophe Giraud, Erik W. Knudsen
openaire +1 more source
Structure-Based RSA Fault Attacks
2012Fault attacks against cryptographic schemes as used in tamper- resistant devices have led to a vibrant research activity in the past. This area was recently augmented by the discovery of attacks even on the public key parts of asymmetric cryptographic schemes like RSA, DSA, and ECC. While being very powerful in principle, all existing attacks until now
Benjamin Michéle +2 more
openaire +1 more source
Differential Fault Attacks on KLEIN
2019This paper proposes two Differential Fault Attacks on the lightweight block cipher KLEIN. Variant one targets the intermediate state of the cipher. Using at least five faulty ciphertexts, the attacker is able to determine the last round key. The second variant, which works only on KLEIN-64, injects a byte-fault in the key schedule and requires at least
Michael Gruber, Bodo Selmke
openaire +1 more source
Evidence for the utility of quantum computing before fault tolerance
Nature, 2023Youngseok Kim +2 more
exaly
Fast universal quantum gate above the fault-tolerance threshold in silicon
Nature, 2022Akito Noiri +2 more
exaly
Vulnerability Prediction Against Fault Attacks
2016Fault-injection exploits hardware weaknesses to perturbate the behaviour of embedded devices. Here, we present new model-based techniques and tools to detect such attacks developed at the High-Security Laboratory at Inria.
Jafri, Nisrine +2 more
openaire +1 more source

