Concurrent structure-independent fault detection schemes for the advanced encryption standard

M Mozaffari-Kermani… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
The Advanced Encryption Standard (AES) has been lately accepted as the symmetric
cryptography standard for confidential data transmission. However, the natural and …

Countermeasures against fault attacks on software implemented AES: effectiveness and cost

A Barenghi, L Breveglieri, I Koren, G Pelosi… - Proceedings of the 5th …, 2010 - dl.acm.org
In this paper we present software countermeasures specifically designed to counteract fault
injection attacks during the execution of a software implementation of a cryptographic …

Cryptographic unit and method for operating a crytographic unit

B Gammel, H Bock, M Goessel - US Patent 7,694,156, 2010 - Google Patents
The present invention relates to the technical field of cryp tography and the present invention
particularly refers to the detection of so called fault attacks of cryptographic units. 2 …

SLICED: Slide-based concurrent error detection technique for symmetric block ciphers

J Rajendran, H Borad, S Mantravadi… - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
Fault attacks, wherein faults are deliberately injected into cryptographic devices, can
compromise their security. Moreover, in the emerging nanometer regime of VLSI, accidental …

[PDF][PDF] Scalable PP-1 block cipher

K Bucholc, K Chmiel, A Grocholewska-Czuryło… - 2010 - intapi.sciendo.com
A totally involutional, highly scalable PP-1 cipher is proposed, evaluated and discussed.
Having very low memory requirements and using only simple and fast arithmetic operations …

Concurrent error detection architectures for Gaussian normal basis multiplication over GF (2m)

CY Lee - Integration, 2010 - Elsevier
This paper presents a method of using a parity prediction scheme for detecting erroneous
outputs in bit-parallel, sequential, and digit-serial Gaussian normal basis (GNB) multipliers …

Differential fault analysis on Camellia

W Li, D Gu, J Li, Z Liu, Y Liu - Journal of Systems and Software, 2010 - Elsevier
Camellia is a 128-bit block cipher published by NTT and Mitsubishi in 2000. On the basis of
the byte-oriented model and the differential analysis principle, we propose a differential fault …

Evaluation of concurrent error detection techniques on the advanced encryption standard

K Bousselam, G Di Natale, ML Flottes… - 2010 IEEE 16th …, 2010 - ieeexplore.ieee.org
Due to the shrinking of transistors dimensions in nowadays technologies, circuits are more
and more sensitive to aging phenomenon, as well as soft errors. Furthermore cryptographic …

Concurrent error detection in semi-systolic dual basis multiplier over GF (2m) using self-checking alternating logic

CW Chiou, WY Liang, HW Chang, JM Lin, CY Lee - IET circuits, devices & …, 2010 - IET
Multiplication is one of the most important finite field arithmetic operations in cryptographic
computations. Recently, the attacks of fault-based cryptanalysis have been a critical threat to …

Dependability analysis of a countermeasure against fault attacks by means of laser shots onto a SRAM-based FPGA

G Canivet, P Maistri, R Leveugle… - ASAP 2010-21st …, 2010 - ieeexplore.ieee.org
Laser-based fault injections are currently the most efficient technique that can be used to
attack a secure system, since they have very high timing and location precision. Several …