Results 261 to 270 of about 3,574 (299)
Some of the next articles are maybe not open access.
Optical Fault Injection Attacks against Cipher Chip
Advanced Materials Research, 2014Cipher chips, such as microprocessors, are playing the important role in most cryptosystems, and implementing many public cryptographic algorithms. However, Side channel attacks pose serious threats to Cipher chips. Optical Side channel attack is a new kind of method against cipher chips.
Hong Sheng Wang +4 more
openaire +1 more source
2020
Fault injection attacks pose serious threat in security of embedded devices since they require less expertise to conduct them. Suitable countermeasures can only be built if there effects are studied and analyzed in detail. This paper presents circuits which produces power fault injection attack (positive, negative, positive/negative) through voltage ...
Shaminder Kaur +3 more
openaire +1 more source
Fault injection attacks pose serious threat in security of embedded devices since they require less expertise to conduct them. Suitable countermeasures can only be built if there effects are studied and analyzed in detail. This paper presents circuits which produces power fault injection attack (positive, negative, positive/negative) through voltage ...
Shaminder Kaur +3 more
openaire +1 more source
Injection Technologies for Fault Attacks on Microprocessors
2012The dependability of computing systems running cryptographic primitives is a critical factor for evaluating the practical security of any cryptographic scheme. Indeed, the observation of erroneous results produced by a computing device after the artificial injection of transient faults is one of the most effective side-channel attacks.
BARENGHI, ALESSANDRO +4 more
openaire +2 more sources
Fault Injection Attacks Against RSA-CRT Digital Signature
The RSA cryptosystem is currently the most widely used public key encryption system. It allows to guarantee the confidentiality, integrity and authen- ticity of the information transmitted or stored. Moreover, RSA cryptosystem is con- sidered to be mathematically secure against the integer factorization methods, but there are other attacks whose ...Contreras Alcalá, Fernando +2 more
openaire +2 more sources
Reactive Design Strategies Against Fault Injection Attacks
2018In this chapter, we present to the readers two fault injection sensors against powerful fault injection techniques like laser and electromagnetic glitch. The first sensor is built upon a watchdog ring oscillator monitor with a standard Phase Locked Loop (PLL) block.
Jakub Breier, Wei He, Shivam Bhasin
openaire +1 more source
A fault-injection attack on Fiat-Shamir cryptosystems
24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings., 2004Fault-injection attacks and cryptanalysis is a realistic threat for systems implementing cryptographic algorithms. We revisit the fault-injection attacks on the Fiat-Shamir authentication scheme, a popular authentication scheme for service providers like pay per view television, video distribution and cellular phones.
A.G. Voyiatzis, D.N. Serpanos
openaire +1 more source
JTAG Combined Attack - Another Approach for Fault Injection
2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2016The combined attacks are widely spread in the domain of smart cards and microcontrollers but they have not been yet democratized on System on chip (SoC) such as those that can be found in smart phones, tablets and automotive systems. The main reason behind this is the complexity to inject a fault at the right place and at the right time to make these ...
F. Majeric, B. Gonzalvo, L. Bossuet
openaire +1 more source
On Analyzing Program Behavior under Fault Injection Attacks
2016 11th International Conference on Availability, Reliability and Security (ARES), 2016Fault attacks pose a serious threat to cryptographic algorithm implementations. It is a non-trivial task to design a code that minimizes the risk of exploiting the incorrect output that was produced by inducing faults in the algorithm execution process.
openaire +1 more source
Evidence for the utility of quantum computing before fault tolerance
Nature, 2023Youngseok Kim +2 more
exaly

