Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard

M Karpovsky, KJ Kulikowski… - … on Dependable Systems …, 2004 - ieeexplore.ieee.org
We present a method of protecting a hardware implementation of the advanced encryption
standard (AES) against a side-channel attack known as differential fault analysis attack. The …

Low cost concurrent error detection for the advanced encryption standard

K Wu, R Karri, G Kuznetsov… - … International Conferce on …, 2004 - ieeexplore.ieee.org
We present a new low-cost concurrent checking method for the advanced encryption
standard (AES) encryption algorithm. In this method, the parity of the 128-bit input is …

Differential fault analysis attack resistant architectures for the advanced encryption standard

M Karpovsky, KJ Kulikowski, A Taubin - … Computer Congress TC8/WG8. 8 & …, 2004 - Springer
We present two architectures for protecting a hardware implementation of AES against side-
channel attacks known as Differential Fault Analysis attacks. The first architecture, which is …

An efficient hardware-based fault diagnosis scheme for AES: performances and cost

G Bertoni, L Breveglieri, I Koren… - 19th IEEE International …, 2004 - ieeexplore.ieee.org
Since standardization in 2001, the Advanced Encryption Standard has been the subject of
many research efforts, aimed at developing efficient hardware implementations with reduced …

Concurrent error detection schemes for involution ciphers

N Joshi, K Wu, R Karri - … Hardware and Embedded Systems-CHES 2004 …, 2004 - Springer
Because of the rapidly shrinking dimensions in VLSI, transient and permanent faults arise
and will continue to occur in the near future in increasing numbers. Since cryptographic …

Detecting faults in four symmetric key block ciphers

L Breveglieri, I Koren, P Maistri - Proceedings. 15th IEEE …, 2004 - ieeexplore.ieee.org
Fault detection in encryption algorithms is gaining in importance since fault attacks may
compromise even recently developed cryptosystems. We analyze the different operations …

Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults

A De Gregorio - Cryptology ePrint Archive, 2004 - eprint.iacr.org
With physical attacks threatening the security of current cryptographic schemes, no security
policy can be developed without taking into account the physical nature of computation. In …

循環碼, MP3 以及先進加密標準之複合式編碼研究

顏志旭, 吳炳飛 - 2004 - ir.lib.nycu.edu.tw
本論文在循環碼, MP3 以及先進加密標準三種編碼技術上, 以安全編碼為主軸,
通道編碼和訊源編碼為支線, 進行複合式編碼之研究, 目的在於提升應用面上的編碼效能或其 …

High-level synthesis for on-line testability

P Oikonomakos - 2004 - eprints.soton.ac.uk
On-line testing increases hardware reliability, which is essential in safety-critical
applications, particularly in hostile operating conditions. High-level synthesis, on the other …

[引用][C] Concurrent Error Detection for Involutional Substitution Permutation Networks

N Joshi, K Wu, J Sundararajan, R Karri