CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks

C Beierle, G Leander, A Moradi… - IACR Transactions on …, 2019 - orbilu.uni.lu
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …

Hardware countermeasures benchmarking against fault attacks

FE Potestad-Ordóñez, E Tena-Sánchez… - Applied Sciences, 2022 - mdpi.com
The development of differential fault analysis (DFA) techniques and mechanisms to inject
faults into cryptographic circuits brings with it the need to use protection mechanisms that …

[HTML][HTML] Quantum Computing Research in Medical Sciences

S Alrashed, N Min-Allah - Informatics in Medicine Unlocked, 2024 - Elsevier
With the emergence of ever-improving quantum computers, technology is making its way to
revolutionize many fields, and the medical sector is no exception. Recent efforts have …

Reliable hardware architectures for cryptographic block ciphers LED and HIGHT

S Subramanian, M Mozaffari-Kermani… - … on Computer-Aided …, 2017 - ieeexplore.ieee.org
Cryptographic architectures provide different security properties to sensitive usage models.
However, unless reliability of architectures is guaranteed, such security properties can be …

Double-data-rate computation as a countermeasure against fault analysis

P Maistri, R Leveugle - IEEE Transactions on Computers, 2008 - ieeexplore.ieee.org
Differential Fault Analysis (DFA) is one of the most powerful techniques to attack
cryptosystems. Several countermeasures have been proposed, which are based either on …

A lightweight high-performance fault detection scheme for the advanced encryption standard using composite fields

M Mozaffari-Kermani… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
The faults that accidently or maliciously occur in the hardware implementations of the
Advanced Encryption Standard (AES) may cause erroneous encrypted/decrypted output …

Efficient and concurrent reliable realization of the secure cryptographic SHA-3 algorithm

S Bayat-Sarmadi, M Mozaffari-Kermani… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
The secure hash algorithm (SHA)-3 has been selected in 2012 and will be used to provide
security to any application which requires hashing, pseudo-random number generation, and …

Fault detection architectures for post-quantum cryptographic stateless hash-based secure signatures benchmarked on ASIC

M Mozaffari-Kermani, R Azarderakhsh… - ACM Transactions on …, 2016 - dl.acm.org
Symmetric-key cryptography can resist the potential post-quantum attacks expected with the
not-so-faraway advent of quantum computing power. Hash-based, code-based, lattice …

Reliable hash trees for post-quantum stateless cryptographic hash-based signatures

M Mozaffari-Kermani… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
The potential advent of quantum computers in coming years has motivated security
researchers to start develo** resistant systems capable of thwarting future attacks, ie …

Dual-basis superserial multipliers for secure applications and lightweight cryptographic architectures

S Bayat-Sarmadi, MM Kermani… - … on Circuits and …, 2013 - ieeexplore.ieee.org
Cryptographic algorithms utilize finite-field arithmetic operations in their computations. Due
to the constraints of the nodes which benefit from the security and privacy advantages of …