Zobrazeno 1 - 10
of 78
pro vyhledávání: '"Chester Rebeiro"'
Autor:
Keerthi K, Chester Rebeiro
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 2 (2023)
Fault attacks are a potent class of physical attacks that exploit a fault njected during device operation to steal secret keys from a cryptographic device. The success of a fault attack depends intricately on (a) the cryptographic properties of the c
Externí odkaz:
https://doaj.org/article/a6ee2e8d66144071bc4f509bc9c5276c
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 2 (2020)
Fault injection attacks are one of the most powerful forms of cryptanalytic attacks on ciphers. A single, precisely injected fault during the execution of a cipher like the AES, can completely reveal the key within a few milliseconds. Software implem
Externí odkaz:
https://doaj.org/article/54468c4d166740ef8fe8ed4b82479997
Publikováno v:
IEEE Transactions on Computers. 72:1763-1777
Publikováno v:
IEEE Transactions on Computers. 71:40-52
Publikováno v:
Proceedings of the 31st ACM International Conference on Information & Knowledge Management.
Publikováno v:
Cyber Security Experimentation and Test Workshop.
Publikováno v:
ACM Transactions on Architecture and Code Optimization. 18:1-26
Owing to the failure of Dennard’s scaling, the past decade has seen a steep growth of prominent new paradigms leveraging opportunities in computer architecture. Two technologies of interest are Posit and RISC-V. Posit was introduced in mid-2017 as
Publikováno v:
ACM Transactions on Design Automation of Electronic Systems. 26:1-27
Fault attacks belong to a potent class of implementation-based attacks that can compromise a crypto-device within a few milliseconds. Out of the large numbers of faults that can occur in the device, only a very few are exploitable in terms of leaking
Publikováno v:
IEEE Networking Letters. 2:67-70
Spectrum Sharing Data Falsification (SSDF) attacks can cause heavy performance degradation to Cognitive Radio (CR) based Internet of Battlefield Things (IoBT) networks. The challenge in such networks is to handle this security problem real time, in a
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 39:752-765
Most cipher implementations are vulnerable to a class of cryptanalytic attacks known as fault injection attacks. To reveal the secret key, these attacks make use of faults induced at specific locations during the execution of the cipher. Countermeasu