Zobrazeno 1 - 10
of 548
pro vyhledávání: '"Fault Attacks"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
Hardware faults are a known source of security vulnerabilities. Fault injection in secure embedded systems leads to information leakage and privilege escalation, and countless fault attacks have been demonstrated both in simulation and in practice. H
Externí odkaz:
https://doaj.org/article/b6efb1f4d82f4b9e9262d1f1ff300f8b
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 2 (2024)
We present a set of physical profiled attacks against CRYSTALS-Dilithium that accumulate noisy knowledge on secret keys over multiple signatures, finally leading to a full key recovery attack. The methodology is composed of two steps. The first step
Externí odkaz:
https://doaj.org/article/85137043f8054c378a00f88f0bfa4e8b
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 1 (2023)
Fault attacks impose a serious threat against the practical implementations of cryptographic algorithms. Statistical Ineffective Fault Attacks (SIFA), exploiting the dependency between the secret data and the fault propagation overcame many of the kn
Externí odkaz:
https://doaj.org/article/29320cb6b27644ab91485c38cd116930
Autor:
Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 1 (2023)
Deploying cryptography on embedded systems requires security against physical attacks. At CHES 2019, M&M was proposed as a combined countermeasure applying masking against SCAs and information-theoretic MAC tags against FAs. In this paper, we show th
Externí odkaz:
https://doaj.org/article/a74c918c27dc42adac9230dff74f7dc7
Publikováno v:
Symmetry, Vol 16, Iss 3, p 348 (2024)
Cryptographic devices’ complexity necessitates fast security simulation environments against fault attacks. SystemC, a promising candidate in Electronic System Levels (ESLs), can achieve higher simulation speeds while maintaining accuracy and relia
Externí odkaz:
https://doaj.org/article/3d6ee667ee7142eebb22fb7c5631cb5e
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 10, Pp 9844-9851 (2022)
Cryptographic circuits, because they contain confidential information, are subject to fraudulent manipulations, commonly called attacks, by ill-intentioned people. Several attacks have been identified and analyzed. One of the most efficient attacks,
Externí odkaz:
https://doaj.org/article/7d21545aa396453c9a6dc7f3e22b0288
Autor:
Mohamed ElGhamrawy, Melissa Azouaoui, Olivier Bronchain, Joost Renes, Tobias Schneider, Markus Schönauer, Okan Seker, Christine van Vredendaal
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 4 (2023)
The post-quantum digital signature scheme CRYSTALS-Dilithium has been recently selected by the NIST for standardization. Implementing CRYSTALSDilithium, and other post-quantum cryptography schemes, on embedded devices raises a new set of challenges,
Externí odkaz:
https://doaj.org/article/942087e1236247a1b250361baa3d3d0c
Publikováno v:
Cryptography, Vol 8, Iss 1, p 2 (2024)
Hardware implementations of cryptographic primitives require protection against physical attacks and supply chain threats. This raises the question of secure composability of different attack countermeasures, i.e., whether protecting a circuit agains
Externí odkaz:
https://doaj.org/article/9ebed823f2bf4f289538d906ef858121
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Applied Sciences, Vol 13, Iss 22, p 12530 (2023)
The infection countermeasure, in which the main idea is to prevent adversaries from exploiting faulty ciphertexts to break the key by spreading the induced fault, is a very effective countermeasure against fault attacks. However, most existing infect
Externí odkaz:
https://doaj.org/article/b3e1f44b12de4d348b5b503226e20432