A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks

C Beierle, G Leander, A Moradi… - IACR Transactions on …, 2019 - orbilu.uni.lu
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …

How practical are fault injection attacks, really?

J Breier, X Hou - IEEE Access, 2022 - ieeexplore.ieee.org
Fault injection attacks (FIA) are a class of active physical attacks, mostly used for malicious
purposes such as extraction of cryptographic keys, privilege escalation, attacks on neural …

Leakage detection with the x2-test

A Moradi, B Richter, T Schneider… - IACR Transactions on …, 2018 - tches.iacr.org
We describe how Pearson's χ 2-test can be used as a natural complement to Welch's t-test
for black box leakage detection. In particular, we show that by using these two tests in …

Statistical ineffective fault attacks on masked AES with fault countermeasures

C Dobraunig, M Eichlseder, H Groß, S Mangard… - Advances in Cryptology …, 2018 - Springer
Implementation attacks like side-channel and fault attacks are a threat to deployed devices
especially if an attacker has physical access. As a consequence, devices like smart cards …

A survey on security requirements for WSNs: focusing on the characteristics related to security

JY Yu, E Lee, SR Oh, YD Seo, YG Kim - IEEE Access, 2020 - ieeexplore.ieee.org
As WSNs combine with a diversity of next-generation technologies, wireless sensor
networks (WSNs) have gained considerable attention as a promising ubiquitous technology …

Post-quantum cryptoprocessors optimized for edge and resource-constrained devices in IoT

S Ebrahimi, S Bayat-Sarmadi… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
By exponential increase in applications of the Internet of Things (IoT), such as smart
ecosystems or e-health, more security threats have been introduced. In order to resist known …

Efficient hardware arithmetic for inverted binary ring-lwe based post-quantum cryptography

JL Imana, P He, T Bao, Y Tu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Ring learning-with-errors (RLWE)-based encryption scheme is a lattice-based cryptographic
algorithm that constitutes one of the most promising candidates for Post-Quantum …

Impeccable circuits

A Aghaie, A Moradi, S Rasoolzadeh… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
By injecting faults, active physical attacks pose serious threats to cryptographic hardware
where Concurrent Error Detection (CED) schemes are promising countermeasures. They …

Protecting against statistical ineffective fault attacks

J Daemen, C Dobraunig, M Eichlseder… - IACR transactions on …, 2020 - tches.iacr.org
Abstract Statistical Ineffective Fault Attacks (SIFA) pose a threat for many practical
implementations of symmetric primitives. Countermeasures against both power analysis and …