A survey on fault attacks on symmetric key cryptosystems
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
Combined private circuits-combined security refurbished
Physical attacks are well-known threats to cryptographic implementations. While
countermeasures against passive Side-Channel Analysis (SCA) and active Fault Injection …
countermeasures against passive Side-Channel Analysis (SCA) and active Fault Injection …
Fault attacks in symmetric key cryptosystems
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
Cryptography and Embedded Systems Security
Cryptography is an indispensable tool used to protect information in computing systems.
Billions of people all over the world use it in their daily lives without even noticing there is …
Billions of people all over the world use it in their daily lives without even noticing there is …
Blind side-channel SIFA
M Azouaoui, K Papagiannopoulos… - … Design, Automation & …, 2021 - ieeexplore.ieee.org
Statistical Ineffective Fault Attacks (SIFA) have been recently proposed as very powerful key-
recovery strategies on symmetric cryptographic primitives' implementations. Specifically …
recovery strategies on symmetric cryptographic primitives' implementations. Specifically …
Dapa: differential analysis aided power attack on (non-) linear feedback shift registers (extended version)
Differential power analysis (DPA) is a form of side-channel analysis (SCA) that performs
statistical analysis on the power traces of cryptographic computations. DPA is applicable to …
statistical analysis on the power traces of cryptographic computations. DPA is applicable to …
Fault Attacks and Countermeasures
Fault attacks are active attacks where the attacker tries to perturb the internal computations
by external means. Such attacks exploit a scenario where the attacker has access to the …
by external means. Such attacks exploit a scenario where the attacker has access to the …
Theoretical models for physical security and their application
J Feldtkeller - 2024 - hss-opus.ub.ruhr-uni-bochum.de
Computertechnologien sind heute so sehr verwoben mit unserer Existenz, dass moderne
Türen sowohl physisch als auch metaphorisch durch einen Strom digitaler Daten geöffnet …
Türen sowohl physisch als auch metaphorisch durch einen Strom digitaler Daten geöffnet …
Detecting faults in inner product masking scheme: IPM-FD: IPM with fault detection (extended version)
Side-channel analysis and fault injection attacks are two typical threats to cryptographic
implementations, especially in modern embedded devices. Thus, there is an insistent …
implementations, especially in modern embedded devices. Thus, there is an insistent …
[PDF][PDF] Detecting Faults in Inner Product Masking Scheme
Side-channel analysis and fault injection attacks are two typical threats to cryptographic
implementations, especially in modern embedded devices. Thus there is an insistent …
implementations, especially in modern embedded devices. Thus there is an insistent …