Results 11 to 20 of about 3,574 (299)

Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
RISC-V is equipped with physical memory protection (PMP) to prevent malicious software from accessing protected memory regions. PMP provides a trusted execution environment (TEE) that isolates secure and insecure applications. In this study, we propose a
Shoei Nashimoto   +3 more
doaj   +1 more source

Single-Byte Error-Based Practical Differential Fault Attack on Bit-Sliced Lightweight Block Cipher PIPO

open access: yesIEEE Access, 2022
With the recent development of the Internet of Things (IoT), related device use is increasing rapidly. As a result, accessing and hijacking the devices is an increasing security threat.
Seonghyuck Lim   +2 more
doaj   +1 more source

Exploiting statistical effective fault attack in a blind setting

open access: yesIET Information Security, 2023
In order to obtain the secret key, the majority of physical attacks require knowledge of the plaintext or ciphertext, which may be unavailable or cannot be exploited.
Navid Vafaei   +2 more
doaj   +1 more source

Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis

open access: yesEntropy, 2023
Lightweight block ciphers are normally used in low-power resource-constrained environments, while providing reliable and sufficient security. Therefore, it is important to study the security and reliability of lightweight block ciphers.
Xing Fang   +4 more
doaj   +1 more source

Fault-Aware Adversary Attack Analyses and Enhancement for RRAM-Based Neuromorphic Accelerator

open access: yesFrontiers in Sensors, 2022
Neural networks have been widely deployed in sensor networks and IoT systems due to the advance in lightweight design and edge computing as well as emerging energy-efficient neuromorphic accelerators.
Liuting Shang   +3 more
doaj   +1 more source

Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition

open access: yesIEEE Access, 2020
Recently, as the number of IoT (Internet of Things) devices has increased, the use of lightweight cryptographic algorithms that are suitable for environments with scarce resources has also increased.
Seonghyuck Lim   +2 more
doaj   +1 more source

Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD

open access: yesIEEE Access, 2021
Grain-128AEAD is a lightweight authenticated encryption stream cipher and one of the finalists in the National Institute of Standards and Technology (NIST) Lightweight Cryptography (LWC) project. This paper provides an independent third-party analysis of
Iftekhar Salam   +5 more
doaj   +1 more source

Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem

open access: yes网络与信息安全学报, 2019
As a widely-applied public-key cryptosystem in TLS, SSL and IPSec protocols, the security of RSA cryptosystem is of great importance. At FDTC 2014, Rauzy and Guilley proposed several improved countermeasure algorithms of RSA implementation based on ...
KONG Fanyu, LIU Xiaodong, ZHOU Dashui
doaj   +3 more sources

Silicon Proven 1.29 μm × 1.8 μm 65nm Sub-Vt Optical Sensor for Hardware Security Applications

open access: yesIEEE Access, 2023
Optical fault injection is a type of attack vector targeting cryptographic circuits where the adversary injects faults during system operation to bypass defenses or reveal secret information. Since preventing this kind of attack is generally impractical,
David Zooker   +3 more
doaj   +1 more source

SoK: Fault Injection Attacks on Cryptosystems

open access: yesProceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, 2023
Published ...
Tinghung Chiu, Wenjie Xiong
openaire   +2 more sources

Home - About - Disclaimer - Privacy