CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …
implementation of cryptographic primitives after the algorithms have been designed for …
Hardware countermeasures benchmarking against fault attacks
The development of differential fault analysis (DFA) techniques and mechanisms to inject
faults into cryptographic circuits brings with it the need to use protection mechanisms that …
faults into cryptographic circuits brings with it the need to use protection mechanisms that …
[HTML][HTML] Quantum Computing Research in Medical Sciences
With the emergence of ever-improving quantum computers, technology is making its way to
revolutionize many fields, and the medical sector is no exception. Recent efforts have …
revolutionize many fields, and the medical sector is no exception. Recent efforts have …
Reliable hardware architectures for cryptographic block ciphers LED and HIGHT
S Subramanian, M Mozaffari-Kermani… - … on Computer-Aided …, 2017 - ieeexplore.ieee.org
Cryptographic architectures provide different security properties to sensitive usage models.
However, unless reliability of architectures is guaranteed, such security properties can be …
However, unless reliability of architectures is guaranteed, such security properties can be …
Double-data-rate computation as a countermeasure against fault analysis
P Maistri, R Leveugle - IEEE Transactions on Computers, 2008 - ieeexplore.ieee.org
Differential Fault Analysis (DFA) is one of the most powerful techniques to attack
cryptosystems. Several countermeasures have been proposed, which are based either on …
cryptosystems. Several countermeasures have been proposed, which are based either on …
A lightweight high-performance fault detection scheme for the advanced encryption standard using composite fields
M Mozaffari-Kermani… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
The faults that accidently or maliciously occur in the hardware implementations of the
Advanced Encryption Standard (AES) may cause erroneous encrypted/decrypted output …
Advanced Encryption Standard (AES) may cause erroneous encrypted/decrypted output …
Efficient and concurrent reliable realization of the secure cryptographic SHA-3 algorithm
The secure hash algorithm (SHA)-3 has been selected in 2012 and will be used to provide
security to any application which requires hashing, pseudo-random number generation, and …
security to any application which requires hashing, pseudo-random number generation, and …
Fault detection architectures for post-quantum cryptographic stateless hash-based secure signatures benchmarked on ASIC
Symmetric-key cryptography can resist the potential post-quantum attacks expected with the
not-so-faraway advent of quantum computing power. Hash-based, code-based, lattice …
not-so-faraway advent of quantum computing power. Hash-based, code-based, lattice …
Reliable hash trees for post-quantum stateless cryptographic hash-based signatures
M Mozaffari-Kermani… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
The potential advent of quantum computers in coming years has motivated security
researchers to start develo** resistant systems capable of thwarting future attacks, ie …
researchers to start develo** resistant systems capable of thwarting future attacks, ie …
Dual-basis superserial multipliers for secure applications and lightweight cryptographic architectures
Cryptographic algorithms utilize finite-field arithmetic operations in their computations. Due
to the constraints of the nodes which benefit from the security and privacy advantages of …
to the constraints of the nodes which benefit from the security and privacy advantages of …