CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks

C Beierle, G Leander, A Moradi… - IACR Transactions on …, 2019 - orbilu.uni.lu
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …

ParTI–towards combined hardware countermeasures against side-channel and fault-injection attacks

T Schneider, A Moradi, T Güneysu - … , Santa Barbara, CA, USA, August 14 …, 2016 - Springer
Side-channel analysis and fault-injection attacks are known as major threats to any
cryptographic implementation. Hardening cryptographic implementations with appropriate …

Memory leakage-resilient encryption based on physically unclonable functions

F Armknecht, R Maes, AR Sadeghi, B Sunar… - … Foundations and Practice, 2010 - Springer
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions |
SpringerLink Skip to main content Advertisement SpringerLink Account Menu Find a journal …

A comparative cost/security analysis of fault attack countermeasures

TG Malkin, FX Standaert, M Yung - Fault Diagnosis and Tolerance in …, 2006 - Springer
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis
technique against symmetric and asymmetric encryption algorithms. To protect …

Impeccable circuits

A Aghaie, A Moradi, S Rasoolzadeh… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
By injecting faults, active physical attacks pose serious threats to cryptographic hardware
where Concurrent Error Detection (CED) schemes are promising countermeasures. They …

[HTML][HTML] Hardware countermeasures benchmarking against fault attacks

FE Potestad-Ordóñez, E Tena-Sánchez… - Applied Sciences, 2022 - mdpi.com
The development of differential fault analysis (DFA) techniques and mechanisms to inject
faults into cryptographic circuits brings with it the need to use protection mechanisms that …

Infective computation and dummy rounds: Fault protection for block ciphers without check-before-output

B Gierlichs, JM Schmidt, M Tunstall - … , Santiago, Chile, October 7-10, 2012 …, 2012 - Springer
Implementation attacks pose a serious threat for the security of cryptographic devices and
there are a multitude of countermeasures that are used to prevent them. Two …

Laser-induced fault injection on smartphone bypassing the secure boot

A Vasselle, H Thiebeauld, Q Maouhoub… - 2017 Workshop on …, 2017 - ieeexplore.ieee.org
This paper describes the outcome of a laser attack study on an Android smartphone
targeting specifically the secure boot sequence. Laser fault injection has become a classical …

Double-data-rate computation as a countermeasure against fault analysis

P Maistri, R Leveugle - IEEE Transactions on Computers, 2008 - ieeexplore.ieee.org
Differential Fault Analysis (DFA) is one of the most powerful techniques to attack
cryptosystems. Several countermeasures have been proposed, which are based either on …

Security analysis of concurrent error detection against differential fault analysis

X Guo, D Mukhopadhyay, C Jin, R Karri - Journal of Cryptographic …, 2015 - Springer
Differential fault analysis (DFA) poses a significant threat to advanced encryption standard
(AES). Only a single faulty ciphertext is required to extract the secret key. Concurrent error …