Zobrazeno 1 - 10
of 812
pro vyhledávání: '"fault attack"'
Autor:
Paul Grandamme, Pierre-Antoine Tissot, Lilian Bossuet, Jean-Max Dutertre, Brice Colombier, Vincent Grosso
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
Physical attacks, and among them fault injection attacks, are a significant threat to the security of embedded systems. Among the means of fault injection, laser has the significant advantage of being extremely spatially accurate. Numerous state-of-t
Externí odkaz:
https://doaj.org/article/7ea0fe56e59c4e7ea56ab9354c4f8593
Publikováno v:
Electronic Research Archive, Vol 31, Iss 11, Pp 6820-6832 (2023)
Midori is a lightweight block cipher designed by Banik et al. and presented at the ASIACRYPT 2015 conference. According to the block size, it consists of two algorithms, denoted as Midori-64 and Midori-128. Midori generates 8-bit S-Boxes from 4-bit S
Externí odkaz:
https://doaj.org/article/b3aacf3af36447c29918fce0f9187d7a
Autor:
Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 2 (2024)
Post-quantum cryptographic (PQC) algorithms, especially those based on the learning with errors (LWE) problem, have been subjected to several physical attacks in the recent past. Although the attacks broadly belong to two classes – passive side-cha
Externí odkaz:
https://doaj.org/article/512e4f0757904f7383ace71b656f5a39
Autor:
Keerthi K, Chester Rebeiro
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 2 (2023)
Fault attacks are a potent class of physical attacks that exploit a fault njected during device operation to steal secret keys from a cryptographic device. The success of a fault attack depends intricately on (a) the cryptographic properties of the c
Externí odkaz:
https://doaj.org/article/a6ee2e8d66144071bc4f509bc9c5276c
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 10, Pp 67802-67813 (2022)
With the recent development of the Internet of Things (IoT), related device use is increasing rapidly. As a result, accessing and hijacking the devices is an increasing security threat. The challenges of side-channel security of IoT devices are havin
Externí odkaz:
https://doaj.org/article/68923582f2ca42b598736e7ab680b00f
Autor:
Haiyan Xiao, Lifang Wang
Publikováno v:
IEEE Access, Vol 10, Pp 62402-62411 (2022)
In 2011, Wu and Zhang proposed a lightweight block cipher named LBlock, whose plaintext size and key size are 64 bits and 80 bits, respectively. As they said, LBlock can be efficiently implemented in constrained hardware environments, such as wireles
Externí odkaz:
https://doaj.org/article/3ca182b9c58340c6b88a9773f80bff51
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 2 (2023)
In 2018, Zhang et al. introduced the Persistent Fault Analysis (PFA) for the first time, which uses statistical features of ciphertexts caused by faulty Sbox to recover the key of block ciphers. However, for most of the variants of PFA, the prior kno
Externí odkaz:
https://doaj.org/article/18a46bc7e24a4cd0a388b4efb046fa70
Autor:
Aymeric Genêt
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 2 (2023)
SPHINCS+ is a hash-based digital signature scheme that was selected by NIST in their post-quantum cryptography standardization process. The establishment of a universal forgery on the seminal scheme SPHINCS was shown to be feasible in practice by inj
Externí odkaz:
https://doaj.org/article/4d208025f79744cb992e94a569ce45ff
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 4 (2022)
Implementation-based attacks are major concerns for modern cryptography. For symmetric-key cryptography, a significant amount of exploration has taken place in this regard for primitives such as block ciphers. Concerning symmetric-key operating modes
Externí odkaz:
https://doaj.org/article/8b95226507fe4eb98f3fdfb8437758d7