Results 221 to 230 of about 12,269 (258)
Some of the next articles are maybe not open access.

Attack-resilient fault detection for interconnected systems under DoS attack

ISA Transactions
In light of the expanding cyber-space applications, the imperative consideration of cyber-attack ramifications on system security is evident. This paper presents a resilient dynamic event-triggered fault detection scheme for a class of nonlinear interconnected systems subjected to denial of service (DoS) attacks. To counteract multifaceted threats, the
Qidong Liu   +3 more
openaire   +2 more sources

Fault Attacks on Stream Ciphers

2012
In this chapter, we provide an outlook on fault attack techniques aimed at breaking stream ciphers. The chapter will start with an overview of the possible targets for fault attacks among this class of encryption algorithms, and subsequently provide two in-depth case studies on enhancing impossible cryptanalysis against RC4 and differential ...
Alessandro Barenghi, Elena Trichina
openaire   +1 more source

A fault attack robust TRNG

2012 IEEE 18th International On-Line Testing Symposium (IOLTS), 2012
True random number generators (TRNGs) are used for cryptographic operations. By the use of TRNGs secret keys can be generated and the design can be made robust against attacks. In order to simplify further attacks the adversary tries to introduce some bias in the probability distribution of the TRNG output. A possibility to detect such attacks is shown
E. Bohl, M. Ihle
openaire   +1 more source

Fault Attacks on Signature Schemes

2004
In 1996, Bao, Deng, Han, Jeng, Narasimhalu and Ngair presented bit-fault attacks on some signature schemes such as DSA, El Gamal and Schnorr signatures schemes. Unfortunately nowadays, their fault model is still very difficult to apply in practice. In this paper we extend Bao et al.’s attacks on the DSA, the ElGamal and the Schnorr signature by using a
Christophe Giraud, Erik W. Knudsen
openaire   +1 more source

Structure-Based RSA Fault Attacks

2012
Fault attacks against cryptographic schemes as used in tamper- resistant devices have led to a vibrant research activity in the past. This area was recently augmented by the discovery of attacks even on the public key parts of asymmetric cryptographic schemes like RSA, DSA, and ECC. While being very powerful in principle, all existing attacks until now
Benjamin Michéle   +2 more
openaire   +1 more source

Differential Fault Attacks on KLEIN

2019
This paper proposes two Differential Fault Attacks on the lightweight block cipher KLEIN. Variant one targets the intermediate state of the cipher. Using at least five faulty ciphertexts, the attacker is able to determine the last round key. The second variant, which works only on KLEIN-64, injects a byte-fault in the key schedule and requires at least
Michael Gruber, Bodo Selmke
openaire   +1 more source

Evidence for the utility of quantum computing before fault tolerance

Nature, 2023
Youngseok Kim   +2 more
exaly  

Fast universal quantum gate above the fault-tolerance threshold in silicon

Nature, 2022
Akito Noiri   +2 more
exaly  

Vulnerability Prediction Against Fault Attacks

2016
Fault-injection exploits hardware weaknesses to perturbate the behaviour of embedded devices. Here, we present new model-based techniques and tools to detect such attacks developed at the High-Security Laboratory at Inria.
Jafri, Nisrine   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy