Hardware designer's guide to fault attacks

D Karaklajić, JM Schmidt… - IEEE Transactions on …, 2013‏ - ieeexplore.ieee.org
Hardware designers invest a significant design effort when implementing computationally
intensive cryptographic algorithms onto constrained embedded devices to match the …

Embedded electronic circuits for cryptography, hardware security and true random number generation: an overview

AJ Acosta, T Addabbo… - International Journal of …, 2017‏ - Wiley Online Library
We provide an overview of selected crypto‐hardware devices, with a special reference to the
lightweight electronic implementation of encryption/decryption schemes, hash functions, and …

Attack on a DFA protected AES by simultaneous laser fault injections

B Selmke, J Heyszl, G Sigl - 2016 Workshop on Fault …, 2016‏ - ieeexplore.ieee.org
This paper demonstrates a Fault Attack on anAES core protected by an infection type
countermeasure. The redundant AES is implemented on a **linx Spartan-6FPGA, with a …

Security analysis of concurrent error detection against differential fault analysis

X Guo, D Mukhopadhyay, C **, R Karri - Journal of Cryptographic …, 2015‏ - Springer
Differential fault analysis (DFA) poses a significant threat to advanced encryption standard
(AES). Only a single faulty ciphertext is required to extract the secret key. Concurrent error …

Review of gate‐level differential power analysis and fault analysis countermeasures

H Marzouqi, M Al‐Qutayri, K Salah - IET Information Security, 2014‏ - Wiley Online Library
Hardware implementation of modern crypto devices paves the way for a special type of
cryptanalysis, which is known as side channel analysis (SCA) attacks. These attacks are …

Voltage glitch attacks on mixed-signal systems

N Beringuier-Boher, K Gomina, D Hély… - 2014 17th Euromicro …, 2014‏ - ieeexplore.ieee.org
Supply voltage glitches are a well-known fault injection method used to attack electronic
circuits. The aim of this paper is to identify the specific threats of mixed signal systems and to …

Ciphertext-only fault attacks on PRESENT

F De Santis, OM Guillen, E Sakic, G Sigl - Lightweight Cryptography for …, 2015‏ - Springer
In this work, we introduce fault attacks on PRESENT with faulty ciphertexts-only. In contrast
to current differential fault attacks on PRESENT, which are mostly chosen-plaintext attacks …

Self-assertion-based countermeasures within a risc-v microprocessor for coverage of information leakage faults

I Somoye, TJ Mannos, B Dziki… - IEEE Transactions on …, 2024‏ - ieeexplore.ieee.org
The execution behavior of a microprocessor in the presence of a fault is difficult to predict
because of the complex interactions across pipeline stages and between functional units …

Evaluating capstone project through flexible and collaborative use of Scrum framework

RT de Souza, SD Zorzo… - 2015 IEEE Frontiers in …, 2015‏ - ieeexplore.ieee.org
Scrum framework disseminates principles that guarantee a dynamic and adaptable Software
development process. Supporting the software engineering teaching using agile …