Quantitative Fault Injection Analysis

J Feldtkeller, T Güneysu, P Schaumont - … on the Theory and Application of …, 2023 - Springer
Active fault injection is a credible threat to real-world digital systems computing on sensitive
data. Arguing about security in the presence of faults is non-trivial, and state-of-the-art …

SoK: Assisted Fault Simulation: Existing Challenges and Opportunities Offered by AI

A Adhikary, I Buhan - … Conference on Applied Cryptography and Network …, 2023 - Springer
Fault injection attacks have caused implementations to behave unexpectedly, resulting in a
spectacular bypass of security features and even the extraction of cryptographic keys …

Differential fault analysis attack-tolerant hardware implementation of AES

AK Ghosal, A Sardar, DR Chowdhury - The Journal of Supercomputing, 2024 - Springer
Cryptographic circuits contain various confidential information and are susceptible to
fraudulent manipulations, commonly called attacks, performed by ill-intentioned person. The …

Multi-source fault injection detection using machine learning and sensor fusion

RR Shrivastwa, S Guilley, JL Danger - International Conference on …, 2021 - Springer
Fault attacks have raised serious concern with the growing amount of connected devices.
Even a small vulnerability might compromise a complete network. It is therefore important to …

Error Detection Schemes for τ NAF Conversion within Koblitz Curves Benchmarked on Various ARM Processors

K Ahmadi, S Aghapour, MM Kermani… - Authorea …, 2023 - techrxiv.org
Elliptic curves cryptography, the most widely-deployed pre-quantum public key
cryptography, can be implemented efficiently with Koblitz curves. The reason for these …

Dlpfa: Deep learning based persistent fault analysis against block ciphers

Y Cheng, C Ou, F Zhang, S Zheng - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Deep learning techniques have been widely applied to side-channel analysis (SCA) in
recent years and shown better performance compared with traditional methods. However …

Fault Analysis on AES: A Property-Based Verification Perspective

X Dai, X Wang, X Qu, B Mao… - Tsinghua Science and …, 2023 - ieeexplore.ieee.org
Fault analysis is a frequently used side-channel attack for cryptanalysis. However, existing
fault attack methods usually involve complex fault fusion analysis or computation-intensive …

Efficient Fault Detection Architectures for Modular Exponentiation Targeting Cryptographic Applications Benchmarked on FPGAs

S Aghapour, K Ahmadi, MM Kermani… - arXiv preprint arXiv …, 2024 - arxiv.org
Whether stemming from malicious intent or natural occurrences, faults and errors can
significantly undermine the reliability of any architecture. In response to this challenge, fault …

Providing Integrity for Authenticated Encryption in the Presence of Joint Faults and Leakage

F Berti, I Levi - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Passive (leakage exploitation) and active (fault injection) physical attacks pose a significant
threat to cryptographic schemes. Although leakage-resistant cryptography is well studied …