A survey on fault attacks on symmetric key cryptosystems
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
CINI MINIS: domain isolation for fault and combined security
Observation and manipulation of physical characteristics are well-known and powerful
threats to cryptographic devices. While countermeasures against passive side-channel and …
threats to cryptographic devices. While countermeasures against passive side-channel and …
Revisiting fault adversary models–hardware faults in theory and practice
Fault injection attacks are considered as powerful techniques to successfully attack
embedded cryptographic implementations since various fault injection mechanisms from …
embedded cryptographic implementations since various fault injection mechanisms from …
VERICA-Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering
Physical attacks, including passive Side-Channel Analysis and active Fault Injection
Analysis, are considered among the most powerful threats against physical cryptographic …
Analysis, are considered among the most powerful threats against physical cryptographic …
Fault attacks in symmetric key cryptosystems
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
Learn from your faults: leakage assessment in fault attacks using deep learning
Generic vulnerability assessment of cipher implementations against Fault Attacks (FA) is a
largely unexplored research area. Security assessment against FA is critical for FA …
largely unexplored research area. Security assessment against FA is critical for FA …
Non-profiled side-channel assisted fault attack: A case study on domrep
Recent work has shown that Side-Channel Attacks (SCA) and Fault Attacks (FA) can be
combined, forming an extremely powerful adversarial model, which can bypass even some …
combined, forming an extremely powerful adversarial model, which can bypass even some …
Statistical effective fault attacks: the other side of the coin
The introduction of Statistical Ineffective Fault Attacks (SIFA) has led to a renewed interest in
fault attacks. SIFA requires minimal knowledge of the concrete implementation and is …
fault attacks. SIFA requires minimal knowledge of the concrete implementation and is …
Challenges and opportunities of security-aware EDA
The foundation of every digital system is based on hardware in which security, as a core
service of many applications, should be deeply embedded. Unfortunately, the knowledge of …
service of many applications, should be deeply embedded. Unfortunately, the knowledge of …
Classical and physical security of symmetric key cryptographic algorithms
A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …
electronic communication. The symmetric key algorithms, known as the ciphers, are to …