Results 231 to 238 of about 275,215 (238)
Some of the next articles are maybe not open access.
Safe-Error Analysis of Post-Quantum Cryptography Mechanisms - Short Paper-
2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 2021The NIST selection process for standardizing Post-Quantum Cryptography Mechanisms is currently running. Many papers already studied their theoretical security, but the resistance in deployed device has not been much investigated so far. In particular, fault attack is a serious threat for algorithms implemented in embedded devices.
Luk Bettale +2 more
openaire +1 more source
19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers), 2005
This paper proposes a method for protecting public key schemes from timing and fault attacks. In general, this is accomplished by implementing critical operations using "branch-less" path routines. More particularly, the proposed method provides a modular exponentiation algorithm without any redundant computation does not have a store operation with ...
null Chih-Chung Lu +2 more
openaire +1 more source
This paper proposes a method for protecting public key schemes from timing and fault attacks. In general, this is accomplished by implementing critical operations using "branch-less" path routines. More particularly, the proposed method provides a modular exponentiation algorithm without any redundant computation does not have a store operation with ...
null Chih-Chung Lu +2 more
openaire +1 more source
A systematic M safe-error detection in hardware implementations of cryptographic algorithms
2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012This paper presents a procedure that checks whether a hardware implementation of a cryptographic algorithm is vulnerable to M safe-error attacks. It takes a registertransfer level (RTL) description of a design as an input and exposes the exact timing and a memory element that is a possible target of the attack.
Duško Karaklajić +2 more
openaire +1 more source
Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors
2017Elliptic curve cryptography (ECC) is involved in many secure schemes. Such schemes involve the elliptic curve scalar operation which is particularly security sensitive. Many algorithms of this operation have been proposed including security countermeasures. This paper discusses the security issues of such algorithms when running on a device that can be
Dubeuf, Jeremy +2 more
openaire +2 more sources

