Results 11 to 20 of about 3,574 (299)
RISC-V is equipped with physical memory protection (PMP) to prevent malicious software from accessing protected memory regions. PMP provides a trusted execution environment (TEE) that isolates secure and insecure applications. In this study, we propose a
Shoei Nashimoto +3 more
doaj +1 more source
With the recent development of the Internet of Things (IoT), related device use is increasing rapidly. As a result, accessing and hijacking the devices is an increasing security threat.
Seonghyuck Lim +2 more
doaj +1 more source
Exploiting statistical effective fault attack in a blind setting
In order to obtain the secret key, the majority of physical attacks require knowledge of the plaintext or ciphertext, which may be unavailable or cannot be exploited.
Navid Vafaei +2 more
doaj +1 more source
Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis
Lightweight block ciphers are normally used in low-power resource-constrained environments, while providing reliable and sufficient security. Therefore, it is important to study the security and reliability of lightweight block ciphers.
Xing Fang +4 more
doaj +1 more source
Fault-Aware Adversary Attack Analyses and Enhancement for RRAM-Based Neuromorphic Accelerator
Neural networks have been widely deployed in sensor networks and IoT systems due to the advance in lightweight design and edge computing as well as emerging energy-efficient neuromorphic accelerators.
Liuting Shang +3 more
doaj +1 more source
Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition
Recently, as the number of IoT (Internet of Things) devices has increased, the use of lightweight cryptographic algorithms that are suitable for environments with scarce resources has also increased.
Seonghyuck Lim +2 more
doaj +1 more source
Grain-128AEAD is a lightweight authenticated encryption stream cipher and one of the finalists in the National Institute of Standards and Technology (NIST) Lightweight Cryptography (LWC) project. This paper provides an independent third-party analysis of
Iftekhar Salam +5 more
doaj +1 more source
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
As a widely-applied public-key cryptosystem in TLS, SSL and IPSec protocols, the security of RSA cryptosystem is of great importance. At FDTC 2014, Rauzy and Guilley proposed several improved countermeasure algorithms of RSA implementation based on ...
KONG Fanyu, LIU Xiaodong, ZHOU Dashui
doaj +3 more sources
Silicon Proven 1.29 μm × 1.8 μm 65nm Sub-Vt Optical Sensor for Hardware Security Applications
Optical fault injection is a type of attack vector targeting cryptographic circuits where the adversary injects faults during system operation to bypass defenses or reveal secret information. Since preventing this kind of attack is generally impractical,
David Zooker +3 more
doaj +1 more source
SoK: Fault Injection Attacks on Cryptosystems
Published ...
Tinghung Chiu, Wenjie Xiong
openaire +2 more sources

