A survey on fault attacks on symmetric key cryptosystems
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
SIFA: exploiting ineffective fault inductions on symmetric cryptography
Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and
techniques for fault attacks and countermeasures have been studied extensively. The vast …
techniques for fault attacks and countermeasures have been studied extensively. The vast …
Statistical ineffective fault attacks on masked AES with fault countermeasures
Implementation attacks like side-channel and fault attacks are a threat to deployed devices
especially if an attacker has physical access. As a consequence, devices like smart cards …
especially if an attacker has physical access. As a consequence, devices like smart cards …
Attack on a DFA protected AES by simultaneous laser fault injections
This paper demonstrates a Fault Attack on anAES core protected by an infection type
countermeasure. The redundant AES is implemented on a **linx Spartan-6FPGA, with a …
countermeasure. The redundant AES is implemented on a **linx Spartan-6FPGA, with a …
Protecting against statistical ineffective fault attacks
Abstract Statistical Ineffective Fault Attacks (SIFA) pose a threat for many practical
implementations of symmetric primitives. Countermeasures against both power analysis and …
implementations of symmetric primitives. Countermeasures against both power analysis and …
Fault template attacks on block ciphers exploiting fault propagation
Fault attacks (FA) are one of the potent practical threats to modern cryptographic
implementations. Over the years the FA techniques have evolved, gradually moving towards …
implementations. Over the years the FA techniques have evolved, gradually moving towards …
A framework to counter statistical ineffective fault analysis of block ciphers using domain transformation and error correction
Right from its introduction, fault attacks (FA) have been established to be one of the most
practical threats to both public key and symmetric key based cryptosystems. Statistical …
practical threats to both public key and symmetric key based cryptosystems. Statistical …
Fault attacks in symmetric key cryptosystems
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
Cryptography and Embedded Systems Security
Cryptography is an indispensable tool used to protect information in computing systems.
Billions of people all over the world use it in their daily lives without even noticing there is …
Billions of people all over the world use it in their daily lives without even noticing there is …
The influence of IT leaders' leadership behaviour on IT governance performance in higher Education: A literature Review
H Waheed, H Hussin… - … on information and …, 2018 - ieeexplore.ieee.org
IT has become one of the most invested areas of organisations, especially in higher
education institutions. To safeguard these IT investments and make the most out them, a …
education institutions. To safeguard these IT investments and make the most out them, a …