A survey on fault attacks on symmetric key cryptosystems
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
Machine learning and hardware security: Challenges and opportunities
Machine learning techniques have significantly changed our lives. They helped improving
our everyday routines, but they also demonstrated to be an extremely helpful tool for more …
our everyday routines, but they also demonstrated to be an extremely helpful tool for more …
Intelligent UAVs trajectory optimization from space-time for data collection in social networks
With rapid development of artificial intelligence (AI) technology, social network (SN) can use
AI to extract useful knowledge of users to improve the quality of peoples lives. Although AI …
AI to extract useful knowledge of users to improve the quality of peoples lives. Although AI …
Side-channel fuzzy analysis-based AI model extraction attack with information-theoretic perspective in intelligent IoT
Q Pan, J Wu, AK Bashir, J Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Accessibility to smart devices provides opportunities for side-channel attacks (SCAs) on
artificial intelligent (AI) models in the intelligent Internet of Things (IoT). However, the existing …
artificial intelligent (AI) models in the intelligent Internet of Things (IoT). However, the existing …
A deep learning approach for active S-box prediction of lightweight generalized feistel block ciphers
One of the main security requirements for symmetric-key block ciphers is resistance against
differential cryptanalysis. This is commonly assessed by counting the number of active …
differential cryptanalysis. This is commonly assessed by counting the number of active …
Learn from your faults: leakage assessment in fault attacks using deep learning
Generic vulnerability assessment of cipher implementations against Fault Attacks (FA) is a
largely unexplored research area. Security assessment against FA is critical for FA …
largely unexplored research area. Security assessment against FA is critical for FA …
Classical and physical security of symmetric key cryptographic algorithms
A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …
electronic communication. The symmetric key algorithms, known as the ciphers, are to …
SAFARI: Automatic synthesis of fault-attack resistant block cipher implementations
Most cipher implementations are vulnerable to a class of cryptanalytic attacks known as fault
injection attacks. To reveal the secret key, these attacks make use of faults induced at …
injection attacks. To reveal the secret key, these attacks make use of faults induced at …
Investigating deep learning approaches on the security analysis of cryptographic algorithms
BY Chong, I Salam - Cryptography, 2021 - mdpi.com
This paper studies the use of deep learning (DL) models under a known-plaintext scenario.
The goal of the models is to predict the secret key of a cipher using DL techniques. We …
The goal of the models is to predict the secret key of a cipher using DL techniques. We …
Multi-source fault injection detection using machine learning and sensor fusion
Fault attacks have raised serious concern with the growing amount of connected devices.
Even a small vulnerability might compromise a complete network. It is therefore important to …
Even a small vulnerability might compromise a complete network. It is therefore important to …