Impeccable circuits

A Aghaie, A Moradi, S Rasoolzadeh… - IEEE Transactions …, 2019‏ - ieeexplore.ieee.org
By injecting faults, active physical attacks pose serious threats to cryptographic hardware
where Concurrent Error Detection (CED) schemes are promising countermeasures. They …

Protecting against statistical ineffective fault attacks

J Daemen, C Dobraunig… - IACR transactions …, 2020‏ - moving-the-social.ub.rub.de
Statistical Ineffective Fault Attacks (SIFA) pose a threat for many practical implementations of
symmetric primitives. Countermeasures against both power analysis and fault attacks …

Combined private circuits-combined security refurbished

J Feldtkeller, T Güneysu, T Moos… - Proceedings of the …, 2023‏ - dl.acm.org
Physical attacks are well-known threats to cryptographic implementations. While
countermeasures against passive Side-Channel Analysis (SCA) and active Fault Injection …

Cryptographic fault diagnosis using VerFI

V Arribas, F Wegener, A Moradi… - 2020 IEEE International …, 2020‏ - ieeexplore.ieee.org
Historically, fault diagnosis for integrated circuits has singularly dealt with reliability
concerns. In contrast, a cryptographic circuit needs to be primarily evaluated concerning …

VERICA-Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering

J Richter-Brockmann, J Feldtkeller… - IACR Transactions on …, 2022‏ - incs.ub.rub.de
Physical attacks, including passive Side-Channel Analysis and active Fault Injection
Analysis, are considered among the most powerful threats against physical cryptographic …

Friet: An Authenticated Encryption Scheme with Built-in Fault Detection

T Simon, L Batina, J Daemen, V Grosso… - … Conference on the …, 2020‏ - Springer
In this work we present a duplex-based authenticated encryption scheme Friet based on a
new permutation called Friet-P. We designed Friet-P with a novel approach for cryptographic …

A survey and perspective on artificial intelligence for security-aware electronic design automation

D Koblah, R Acharya, D Capecci… - ACM Transactions on …, 2023‏ - dl.acm.org
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly
used in several fields to improve performance and the level of automation. In recent years …

Combined fault and leakage resilience: Composability, constructions and compiler

S Berndt, T Eisenbarth, S Faust, M Gourjon… - Annual International …, 2023‏ - Springer
Real-world cryptographic implementations nowadays are not only attacked via classical
cryptanalysis but also via implementation attacks, including passive attacks (observing side …

Domrep–an orthogonal countermeasure for arbitrary order side-channel and fault attack protection

M Gruber, M Probst, P Karl… - IEEE Transactions …, 2021‏ - ieeexplore.ieee.org
Protection against physical attacks is a major requirement for cryptographic implementations
on devices which can be accessed by attackers. Side-channel and fault injection attacks are …

Learn from your faults: leakage assessment in fault attacks using deep learning

S Saha, M Alam, A Bag, D Mukhopadhyay… - Journal of …, 2023‏ - Springer
Generic vulnerability assessment of cipher implementations against Fault Attacks (FA) is a
largely unexplored research area. Security assessment against FA is critical for FA …