Results 31 to 40 of about 12,269 (258)

A Fault Attack on the Family of Enocoro Stream Ciphers

open access: yesCryptography, 2021
A differential fault attack framework for the Enocoro family of stream ciphers is presented. We only require that the attacker can reset the internal state and inject a random byte-fault, in a random register, during a known time period.
Julian Danner, Martin Kreuzer
doaj   +1 more source

Model-Based Generation of Attack-Fault Trees

open access: yes, 2023
Joint safety and security analysis of cyber-physical systems is a necessary step to correctly capture inter-dependencies between these properties. Attack-Fault Trees represent a combination of dynamic Fault Trees and Attack Trees and can be used to model and model-check a holistic view on both safety and security.
Raffaela Groner   +7 more
openaire   +3 more sources

Algebraic fault attack on PRESENT

open access: yesTongxin xuebao, 2012
A new fault analysis method on PRESENT—algebraic fault attack was proposed.This attack combined conventional algebraic cryptanalysis with fault attack,firstly built equivalent Boolean algebraic equations of cipher encryption by algebraic cryptanalysis ...
Ke-hui WU   +4 more
doaj   +2 more sources

Trivium Stream Cipher Countermeasures Against Fault Injection Attacks and DFA

open access: yesIEEE Access, 2021
Attacks on cryptocircuits are becoming increasingly sophisticated, requiring designers to include more and more countermeasures in the design to protect it against malicious attacks.
F. E. Potestad-Ordonez   +4 more
doaj   +1 more source

Analysis of the Fault Attack ECDLP over Prime Field

open access: yesJournal of Applied Mathematics, 2011
In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. An elliptic curve E is defined over prime field 𝔽p with base point P∈E(𝔽p).
Mingqiang Wang, Tao Zhan
doaj   +1 more source

Fault Attacks on Combiners with Memory [PDF]

open access: yes, 2006
Fault attacks are powerful cryptanalytic tools that are applicable to many types of cryptosystems. Recently, general techniques have been developed which can be used to attack many standard constructions of stream ciphers based on LFSR's. Some more elaborated methods have been invented to attack RC4. These fault attacks are not applicable in general to
Armknecht, Frederik, Meier, Willi
openaire   +1 more source

FaultMeter: Quantitative Fault Attack Assessment of Block Cipher Software

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Fault attacks are a potent class of physical attacks that exploit a fault njected during device operation to steal secret keys from a cryptographic device.
Keerthi K, Chester Rebeiro
doaj   +1 more source

Organ‐specific redox imbalances in spinal muscular atrophy mice are partially rescued by SMN antisense oligonucleotides

open access: yesFEBS Letters, EarlyView.
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley   +1 more source

SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and techniques for fault attacks and countermeasures have been studied extensively.
Christoph Dobraunig   +5 more
doaj   +1 more source

Aggressive prostate cancer is associated with pericyte dysfunction

open access: yesMolecular Oncology, EarlyView.
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy