Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Hardware designer's guide to fault attacks
D Karaklajić, JM Schmidt… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Hardware designers invest a significant design effort when implementing computationally
intensive cryptographic algorithms onto constrained embedded devices to match the …
intensive cryptographic algorithms onto constrained embedded devices to match the …
Embedded electronic circuits for cryptography, hardware security and true random number generation: an overview
We provide an overview of selected crypto‐hardware devices, with a special reference to the
lightweight electronic implementation of encryption/decryption schemes, hash functions, and …
lightweight electronic implementation of encryption/decryption schemes, hash functions, and …
Attack on a DFA protected AES by simultaneous laser fault injections
This paper demonstrates a Fault Attack on anAES core protected by an infection type
countermeasure. The redundant AES is implemented on a **linx Spartan-6FPGA, with a …
countermeasure. The redundant AES is implemented on a **linx Spartan-6FPGA, with a …
Security analysis of concurrent error detection against differential fault analysis
X Guo, D Mukhopadhyay, C **, R Karri - Journal of Cryptographic …, 2015 - Springer
Differential fault analysis (DFA) poses a significant threat to advanced encryption standard
(AES). Only a single faulty ciphertext is required to extract the secret key. Concurrent error …
(AES). Only a single faulty ciphertext is required to extract the secret key. Concurrent error …
Review of gate‐level differential power analysis and fault analysis countermeasures
H Marzouqi, M Al‐Qutayri, K Salah - IET Information Security, 2014 - Wiley Online Library
Hardware implementation of modern crypto devices paves the way for a special type of
cryptanalysis, which is known as side channel analysis (SCA) attacks. These attacks are …
cryptanalysis, which is known as side channel analysis (SCA) attacks. These attacks are …
Voltage glitch attacks on mixed-signal systems
N Beringuier-Boher, K Gomina, D Hély… - 2014 17th Euromicro …, 2014 - ieeexplore.ieee.org
Supply voltage glitches are a well-known fault injection method used to attack electronic
circuits. The aim of this paper is to identify the specific threats of mixed signal systems and to …
circuits. The aim of this paper is to identify the specific threats of mixed signal systems and to …
Ciphertext-only fault attacks on PRESENT
F De Santis, OM Guillen, E Sakic, G Sigl - Lightweight Cryptography for …, 2015 - Springer
In this work, we introduce fault attacks on PRESENT with faulty ciphertexts-only. In contrast
to current differential fault attacks on PRESENT, which are mostly chosen-plaintext attacks …
to current differential fault attacks on PRESENT, which are mostly chosen-plaintext attacks …
A Quantum-Safe Software-Defined Deterministic Internet of Things (IoT) with Hardware-Enforced Cyber-security for Critical Infrastructures
TH Szymanski - Information, 2024 - mdpi.com
The next-generation “Industrial Internet of Things”(IIoT) will support “Machine-to-
Machine”(M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and …
Machine”(M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and …
Self-assertion-based countermeasures within a risc-v microprocessor for coverage of information leakage faults
I Somoye, TJ Mannos, B Dziki… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The execution behavior of a microprocessor in the presence of a fault is difficult to predict
because of the complex interactions across pipeline stages and between functional units …
because of the complex interactions across pipeline stages and between functional units …
Evaluating capstone project through flexible and collaborative use of Scrum framework
RT de Souza, SD Zorzo… - 2015 IEEE Frontiers in …, 2015 - ieeexplore.ieee.org
Scrum framework disseminates principles that guarantee a dynamic and adaptable Software
development process. Supporting the software engineering teaching using agile …
development process. Supporting the software engineering teaching using agile …