Results 21 to 30 of about 12,269 (258)

Fault Attacks on CCA-secure Lattice KEMs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
NIST’s post-quantum standardization effort very recently entered its final round. This makes studying the implementation-security aspect of the remaining candidates an increasingly important task, as such analyses can aid in the final selection process ...
Peter Pessl, Lukas Prokop
doaj   +1 more source

Backdoor Attack on Deep Neural Networks Triggered by Fault Injection Attack on Image Sensor Interface

open access: yesSensors, 2023
A backdoor attack is a type of attack method that induces deep neural network (DNN) misclassification. The adversary who aims to trigger the backdoor attack inputs the image with a specific pattern (the adversarial mark) into the DNN model (backdoor ...
Tatsuya Oyama   +3 more
doaj   +1 more source

The Security Weakness of Block Cipher Piccolo against Fault Analysis

open access: yesInternational Journal of Distributed Sensor Networks, 2014
Piccolo is a 64-bit lightweight block cipher which is able to be implemented in constrained hardware environments such as a wireless sensor network.
Junghwan Song   +2 more
doaj   +1 more source

Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem

open access: yesIEEE Access, 2019
This paper presents an optimal method for recovering the secret keys of the light encryption device (LED) by combining the impossible differential fault attack with the algebraic differential fault attack. The proposed optimal method effectively improves
Liang Dong   +5 more
doaj   +1 more source

Differential Fault Attack on GIFT [PDF]

open access: yesChinese Journal of Electronics, 2021
GIFT, a lightweight block cipher proposed at CHES2017, has been widely cryptanalyzed this years. This paper studies the differential diffusion characteristics of round function of GIFT at first, and proposes a random nibble-based differential fault attack.
XIE Min, TIAN Feng, LI Jiaqi
openaire   +1 more source

One-Variable Attack on the Industrial Fault Classification System and Its Defense

open access: yesEngineering, 2022
Recently developed fault classification methods for industrial processes are mainly data-driven. Notably, models based on deep neural networks have significantly improved fault classification accuracy owing to the inclusion of a large number of data ...
Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge
doaj   +1 more source

A method for fault recognition in the last three rounds of Advanced Encryption Standard

open access: yesElectronics Letters, 2021
A large number of studies are there for Advanced Encryption Standard (AES) fault attack analysis, but less for fault recognition. This paper presents a recognition method for single‐byte fault which is induced in the last three rounds of AES.
Huilong Jiang   +5 more
doaj   +1 more source

Exploiting statistical effective fault attack in a blind setting

open access: yesIET Information Security, 2023
In order to obtain the secret key, the majority of physical attacks require knowledge of the plaintext or ciphertext, which may be unavailable or cannot be exploited.
Navid Vafaei   +2 more
doaj   +1 more source

Optical Fault Induction Attacks [PDF]

open access: yes, 2003
We describe a new class of attacks on secure microcontrollers and smartcards. Illumination of a target transistor causes it to conduct, thereby inducing a transient fault. Such attacks are practical; they do not even require expensive laser equipment. We have carried them out using a flashgun bought second-hand from a camera store for $30 and with an ...
Sergei P. Skorobogatov, Ross J. Anderson
openaire   +1 more source

Design of fault injection platform for integrated shipboard network system [PDF]

open access: yesJisuanji gongcheng, 2019
In order to solve the test adequacy problem of the integrated shipboard network system,a network fault injection platform is designed.Based on network fault injection and network attack,the fault impact factor is constructed to form a fault model library.
ZHANG Ya
doaj   +1 more source

Home - About - Disclaimer - Privacy