O Keren, M Karpovsky - IEEE Transactions on Communications, 2014 - ieeexplore.ieee.org
Security-oriented error-detecting codes are used to detect fault injection attacks on cryptographic devices. These codes are usually designed for uniformly distributed …
L Feiten, M Sauer, T Schubert… - … on Computer-Aided …, 2015 - ieeexplore.ieee.org
Vulnerability to malicious fault attacks is an emerging concern for hardware circuits that are employed in mobile and embedded systems and process sensitive data. We describe a new …
C Ananiadis, A Papadimitriou, D Hély… - … , Automation & Test …, 2016 - ieeexplore.ieee.org
Secure integrated circuits that implement cryptographic algorithms (eg, AES) require protection against laser attacks. The goal of such attacks is to inject errors during the …
Y Neumeier, O Keren - 2014 19th IEEE European Test …, 2014 - ieeexplore.ieee.org
Security oriented codes are considered as one of the most efficient countermeasures against fault injection attacks. Their efficiency is usually measured in terms of their error …
I Shumsky, O Keren - Information Security Journal: A Global …, 2013 - Taylor & Francis
Modern fault injection techniques allow an adversary to attack cryptographic devices by inducing errors of any multiplicity. The induced errors can affect any part of the circuit …
Currently, the more efficient implementations for cryptographic engines are dedicated structures and only allow processing a single algorithm. On the other hand the existing multi …
I Polian, M Kreuzer - … Symposium on Design and Diagnostics of …, 2013 - ieeexplore.ieee.org
Mobile and embedded systems increasingly process sensitive data, ranging from personal information including health records or financial transactions to parameters of technical …
Z Saffar, S Mohammadi - 2019 16th International ISC (Iranian …, 2019 - ieeexplore.ieee.org
Elliptic curve cryptography (ECC) has shorter key length than other asymmetric cryptography algorithms such as RSA with the same security level. Existing faults in cryptographic …