Results 21 to 30 of about 12,269 (258)
Fault Attacks on CCA-secure Lattice KEMs
NIST’s post-quantum standardization effort very recently entered its final round. This makes studying the implementation-security aspect of the remaining candidates an increasingly important task, as such analyses can aid in the final selection process ...
Peter Pessl, Lukas Prokop
doaj +1 more source
A backdoor attack is a type of attack method that induces deep neural network (DNN) misclassification. The adversary who aims to trigger the backdoor attack inputs the image with a specific pattern (the adversarial mark) into the DNN model (backdoor ...
Tatsuya Oyama +3 more
doaj +1 more source
The Security Weakness of Block Cipher Piccolo against Fault Analysis
Piccolo is a 64-bit lightweight block cipher which is able to be implemented in constrained hardware environments such as a wireless sensor network.
Junghwan Song +2 more
doaj +1 more source
Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem
This paper presents an optimal method for recovering the secret keys of the light encryption device (LED) by combining the impossible differential fault attack with the algebraic differential fault attack. The proposed optimal method effectively improves
Liang Dong +5 more
doaj +1 more source
Differential Fault Attack on GIFT [PDF]
GIFT, a lightweight block cipher proposed at CHES2017, has been widely cryptanalyzed this years. This paper studies the differential diffusion characteristics of round function of GIFT at first, and proposes a random nibble-based differential fault attack.
XIE Min, TIAN Feng, LI Jiaqi
openaire +1 more source
One-Variable Attack on the Industrial Fault Classification System and Its Defense
Recently developed fault classification methods for industrial processes are mainly data-driven. Notably, models based on deep neural networks have significantly improved fault classification accuracy owing to the inclusion of a large number of data ...
Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge
doaj +1 more source
A method for fault recognition in the last three rounds of Advanced Encryption Standard
A large number of studies are there for Advanced Encryption Standard (AES) fault attack analysis, but less for fault recognition. This paper presents a recognition method for single‐byte fault which is induced in the last three rounds of AES.
Huilong Jiang +5 more
doaj +1 more source
Exploiting statistical effective fault attack in a blind setting
In order to obtain the secret key, the majority of physical attacks require knowledge of the plaintext or ciphertext, which may be unavailable or cannot be exploited.
Navid Vafaei +2 more
doaj +1 more source
Optical Fault Induction Attacks [PDF]
We describe a new class of attacks on secure microcontrollers and smartcards. Illumination of a target transistor causes it to conduct, thereby inducing a transient fault. Such attacks are practical; they do not even require expensive laser equipment. We have carried them out using a flashgun bought second-hand from a camera store for $30 and with an ...
Sergei P. Skorobogatov, Ross J. Anderson
openaire +1 more source
Design of fault injection platform for integrated shipboard network system [PDF]
In order to solve the test adequacy problem of the integrated shipboard network system,a network fault injection platform is designed.Based on network fault injection and network attack,the fault impact factor is constructed to form a fault model library.
ZHANG Ya
doaj +1 more source

