Combined private circuits-combined security refurbished
Physical attacks are well-known threats to cryptographic implementations. While
countermeasures against passive Side-Channel Analysis (SCA) and active Fault Injection …
countermeasures against passive Side-Channel Analysis (SCA) and active Fault Injection …
Impeccable circuits
By injecting faults, active physical attacks pose serious threats to cryptographic hardware
where Concurrent Error Detection (CED) schemes are promising countermeasures. They …
where Concurrent Error Detection (CED) schemes are promising countermeasures. They …
Combined fault and leakage resilience: Composability, constructions and compiler
Real-world cryptographic implementations nowadays are not only attacked via classical
cryptanalysis but also via implementation attacks, including passive attacks (observing side …
cryptanalysis but also via implementation attacks, including passive attacks (observing side …
Protecting against statistical ineffective fault attacks
Abstract Statistical Ineffective Fault Attacks (SIFA) pose a threat for many practical
implementations of symmetric primitives. Countermeasures against both power analysis and …
implementations of symmetric primitives. Countermeasures against both power analysis and …
CINI MINIS: domain isolation for fault and combined security
Observation and manipulation of physical characteristics are well-known and powerful
threats to cryptographic devices. While countermeasures against passive side-channel and …
threats to cryptographic devices. While countermeasures against passive side-channel and …
VERICA-Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering
Physical attacks, including passive Side-Channel Analysis and active Fault Injection
Analysis, are considered among the most powerful threats against physical cryptographic …
Analysis, are considered among the most powerful threats against physical cryptographic …
Cryptographic fault diagnosis using VerFI
Historically, fault diagnosis for integrated circuits has singularly dealt with reliability
concerns. In contrast, a cryptographic circuit needs to be primarily evaluated concerning …
concerns. In contrast, a cryptographic circuit needs to be primarily evaluated concerning …
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection
In this work we present a duplex-based authenticated encryption scheme Friet based on a
new permutation called Friet-P. We designed Friet-P with a novel approach for cryptographic …
new permutation called Friet-P. We designed Friet-P with a novel approach for cryptographic …
Domrep–an orthogonal countermeasure for arbitrary order side-channel and fault attack protection
M Gruber, M Probst, P Karl… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Protection against physical attacks is a major requirement for cryptographic implementations
on devices which can be accessed by attackers. Side-channel and fault injection attacks are …
on devices which can be accessed by attackers. Side-channel and fault injection attacks are …
Cryptography and Embedded Systems Security
Cryptography is an indispensable tool used to protect information in computing systems.
Billions of people all over the world use it in their daily lives without even noticing there is …
Billions of people all over the world use it in their daily lives without even noticing there is …