A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

Ascon v1.2: Lightweight Authenticated Encryption and Hashing

C Dobraunig, M Eichlseder, F Mendel, M Schläffer - Journal of Cryptology, 2021 - Springer
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our
information infrastructure. In this paper, we provide the specification of Ascon-128 and …

A review of the nist lightweight cryptography finalists and their fault analyses

H Madushan, I Salam, J Alawatugoda - Electronics, 2022 - mdpi.com
The security of resource-constrained devices is critical in the IoT field, given that everything
is interconnected. Therefore, the National Institute of Standards and Technology (NIST) …

Resilience optimization of post-quantum cryptography key encapsulation algorithms

S Farooq, A Altaf, F Iqbal, EB Thompson, DLR Vargas… - Sensors, 2023 - mdpi.com
Recent developments in quantum computing have shed light on the shortcomings of the
conventional public cryptosystem. Even while Shor's algorithm cannot yet be implemented …

Hardware constructions for error detection in lightweight authenticated cipher ASCON benchmarked on FPGA

J Kaur, MM Kermani… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Lightweight cryptography plays a vital role in securing resource-constrained embedded
systems such as deeply-embedded systems, RFID tags, sensor networks, and the Internet of …

[หนังสือ][B] Status report on the final round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …

A framework to counter statistical ineffective fault analysis of block ciphers using domain transformation and error correction

S Saha, D Jap, DB Roy, A Chakraborty… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Right from its introduction, fault attacks (FA) have been established to be one of the most
practical threats to both public key and symmetric key based cryptosystems. Statistical …

FTC: A universal framework for fault-injection attack detection and prevention

MR Muttaki, MH Rahman, A Kulkarni… - … Transactions on Very …, 2024 - ieeexplore.ieee.org
Fault-injection attacks (FIAs) represent a wide-spread and potent method of compromising
the integrity and confidentiality of integrated circuits (ICs) and electronic systems. These …

Fault attacks in symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …