Fault attacks in symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

[Књига][B] Cryptography and Embedded Systems Security

X Hou, J Breier - 2024 - Springer
Cryptography is an indispensable tool used to protect information in computing systems.
Billions of people all over the world use it in their daily lives without even noticing there is …

Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers—Rocca, Rocca-S and AEGIS

R Anand, T Isobe, AK Kundu, M Rahman… - Journal of Cryptographic …, 2024 - Springer
Abstract The beyond 5G (B5G)/6G eras promise to revolutionize wireless communication
with unprecedented speeds. However, ensuring security across hardware and software is a …

On misuse of nonce-misuse resistance: Adapting differential fault attacks on (few) CAESAR winners

M Khairallah, S Bhasin… - 2019 IEEE 8th …, 2019 - ieeexplore.ieee.org
New cryptographic schemes are often built upon old and proven primitives which withstood
long public scrutiny. The recently concluded CAESAR competition saw several …

Differential fault attack on Rocca

R Anand, T Isobe - International Conference on Information Security and …, 2021 - Springer
Rocca is the first dedicated cipher for 6G systems accepted in ToSC 2021 and will be
presented at FSE 2022. In this paper we show that Rocca is susceptible to differential fault …

DNFA: Differential no-fault analysis of bit permutation based ciphers assisted by side-channel

X Hou, J Breier, S Bhasin - 2021 Design, Automation & Test in …, 2021 - ieeexplore.ieee.org
Physical security of NIST lightweight cryptography competition candidates is gaining
importance as the standardization process progresses. Side-channel attacks (SCA) are a …

Fault Attacks and Countermeasures

X Hou, J Breier - Cryptography and Embedded Systems Security, 2024 - Springer
Fault attacks are active attacks where the attacker tries to perturb the internal computations
by external means. Such attacks exploit a scenario where the attacker has access to the …

Practical Differential Fault Analysis on SKINNY.

N Vafaei, M Porkar, H Ramzanipour, N Bagheri - ISeCure, 2022 - search.ebscohost.com
SKINNY is a lightweight tweakable block cipher that for the first time introduced in CRYPTO
2016. SKINNY is considered in two block sizes: 64 bits and 128 bits, as well as three …

[PDF][PDF] ISeCure

N Vafaei, M Porkar, H Ramzanipour, N Bagheri - 2022 - academia.edu
ABSTRACT SKINNY is a lightweight tweakable block cipher that for the first time introduced
in CRYPTO 2016. SKINNY is considered in two block sizes: 64 bits and 128 bits, as well as …

Design, analysis and implementation of hardware-oriented authenticated encryption

M Khairallah - 2021 - dr.ntu.edu.sg
Lightweight cryptography is one the fastest growing areas in symmetric key cryptography. Its
importance has increased due to applications such as pervasive computing and the Internet …