An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020‏ - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks

C Beierle, G Leander, A Moradi… - IACR Transactions on …, 2019‏ - orbilu.uni.lu
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …

Hardware countermeasures benchmarking against fault attacks

FE Potestad-Ordóñez, E Tena-Sánchez… - Applied Sciences, 2022‏ - mdpi.com
The development of differential fault analysis (DFA) techniques and mechanisms to inject
faults into cryptographic circuits brings with it the need to use protection mechanisms that …

Security analysis of concurrent error detection against differential fault analysis

X Guo, D Mukhopadhyay, C **, R Karri - Journal of Cryptographic …, 2015‏ - Springer
Differential fault analysis (DFA) poses a significant threat to advanced encryption standard
(AES). Only a single faulty ciphertext is required to extract the secret key. Concurrent error …

On the need of randomness in fault attack countermeasures-application to AES

V Lomné, T Roche, A Thillard - 2012 Workshop on Fault …, 2012‏ - ieeexplore.ieee.org
Recent works show that a combination of perturbation and observation attacks on symmetric
ciphers thwarts state-of-the-art countermeasures. In this paper, we first propose a new way …

CAPA: the spirit of beaver against physical attacks

O Reparaz, L De Meyer, B Bilgin, V Arribas… - Advances in Cryptology …, 2018‏ - Springer
In this paper we introduce two things: On one hand we introduce the Tile-Probe-and-Fault
model, a model generalising the wire-probe model of Ishai et al. extending it to cover both …

A side-channel and fault-attack resistant AES circuit working on duplicated complemented values

M Doulcier-Verdier, JM Dutertre… - … Solid-State Circuits …, 2011‏ - ieeexplore.ieee.org
Cryptographic circuits can be subjected to several kinds of side-channel and fault attacks in
order to extract the secret key. Side-channel attacks can be carried by measuring either the …

Classical and physical security of symmetric key cryptographic algorithms

A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021‏ - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …

A comprehensive FPGA-based assessment on fault-resistant AES against correlation power analysis attack

J Dofe, H Pahlevanzadeh, Q Yu - Journal of Electronic Testing, 2016‏ - Springer
The secret key used in a cryptosystem can be retrieved by physical attacks such as side-
channel analysis (SCA) and fault analysis (FA) attacks. Traditionally, countermeasures for …

Fault space transformation: A generic approach to counter differential fault analysis and differential fault intensity analysis on AES-like block ciphers

S Patranabis, A Chakraborty… - IEEE Transactions …, 2016‏ - ieeexplore.ieee.org
Classical fault attacks, such as differential fault analysis (DFA) as well as biased fault
attacks, such as the differential fault intensity analysis (DFIA), have been a major threat to …