Results 31 to 40 of about 3,574 (299)
Classification of Quantum Computer Fault Injection Attacks
7 pages, 4 ...
Xu, Chuanqi +2 more
openaire +2 more sources
Experimental evaluation of differential fault attack on lightweight block cipher PIPO
The recent development of Internet of Things (IoT) devices has increased related security issues. Because of the rapid increase in the use of these devices, the possibility of accessing and hijacking cryptographic devices is increasing.
SeongHyuck Lim, DongāGuk Han
doaj +1 more source
A fault attack on the Niederreiter cryptosystem using binary irreducible Goppa codes [PDF]
A fault injection framework for the decryption algorithm of the Niederreiter public-key cryptosystem using binary irreducible Goppa codes and classical decoding techniques is described. In particular, we obtain low-degree polynomial equations in parts of
Julian Danner, Martin Kreuzer
doaj +1 more source
How Practical Are Fault Injection Attacks, Really?
Fault injection attacks (FIA) are a class of active physical attacks, mostly used for malicious purposes such as extraction of cryptographic keys, privilege escalation, attacks on neural network implementations. There are many techniques that can be used to cause the faults in integrated circuits, many of them coming from the area of failure analysis ...
Jakub Breier, Xiaolu Hou
openaire +2 more sources
An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults
Embedded encryption devices and smart sensors are vulnerable to physical attacks. Due to the continuous shrinking of chip size, laser injection, particle radiation and electromagnetic transient injection are possible methods that introduce transient ...
Liang Dong +5 more
doaj +1 more source
Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms
Fault Injection Attacks are a powerful form of active attack mechanism which can threaten even the strongest of cryptographic algorithms. This attack vector has become more pertinent with the growing popularity of the Internet of things (IoT), which is based on small omnipresent embedded systems interacting with sensitive data of personal or critical ...
Bhasin, Shivam, Mukhopadhyay, Debdeep
openaire +2 more sources
Artificial Neural Networks and Fault Injection Attacks
This chapter is on the security assessment of artificial intelligence (AI) and neural network (NN) accelerators in the face of fault injection attacks. More specifically, it discusses the assets on these platforms and compares them with ones known and well-studied in the field of cryptographic systems. This is a crucial step that must be taken in order
Tajik, Shahin, Ganji, Fatemeh
openaire +2 more sources
Persistent Fault Analysis on Block Ciphers
Persistence is an intrinsic nature for many errors yet has not been caught enough attractions for years. In this paper, the feature of persistence is applied to fault attacks, and the persistent fault attack is proposed.
Fan Zhang +7 more
doaj +1 more source
Private circuits II versus fault injection attacks [PDF]
Cryptographic implementations are subject to physical attacks. Private circuits II is a proven protection against a strong attacker, able to read and write on a finite number of chosen internal nodes. In practice, side-channel analyses and fault injections are less accurate: typically, classical injection techniques (clock and power glitches ...
Henitsoa Rakotomalala +4 more
openaire +1 more source
Cyber defence mechanism is started with modelling the accurate car-following behaviour including cyber attack. The creation of finest models made the path of control action easier. The connection between the vehicles is mathematically formulated with the
Prabhakar Gunasekaran +2 more
doaj +1 more source

