Protecting cryptographic hardware against malicious attacks by nonlinear robust codes

V Tomashevich, Y Neumeier, R Kumar… - … on Defect and Fault …, 2014 - ieeexplore.ieee.org
Fault-based attacks against cryptographic circuits must be addressed by techniques that are
different from approaches designed for random transient faults. We systematically …

Relations between the entropy of a source and the error masking probability for security-oriented codes

O Keren, M Karpovsky - IEEE Transactions on Communications, 2014 - ieeexplore.ieee.org
Security-oriented error-detecting codes are used to detect fault injection attacks on
cryptographic devices. These codes are usually designed for uniformly distributed …

Formal vulnerability analysis of security components

L Feiten, M Sauer, T Schubert… - … on Computer-Aided …, 2015 - ieeexplore.ieee.org
Vulnerability to malicious fault attacks is an emerging concern for hardware circuits that are
employed in mobile and embedded systems and process sensitive data. We describe a new …

On the development of a new countermeasure based on a laser attack RTL fault model

C Ananiadis, A Papadimitriou, D Hély… - … , Automation & Test …, 2016 - ieeexplore.ieee.org
Secure integrated circuits that implement cryptographic algorithms (eg, AES) require
protection against laser attacks. The goal of such attacks is to inject errors during the …

A new efficiency criterion for security oriented error correcting codes

Y Neumeier, O Keren - 2014 19th IEEE European Test …, 2014 - ieeexplore.ieee.org
Security oriented codes are considered as one of the most efficient countermeasures
against fault injection attacks. Their efficiency is usually measured in terms of their error …

Enhancement of hardware security by hamming-ball based state assignment

I Shumsky, O Keren - Information Security Journal: A Global …, 2013 - Taylor & Francis
Modern fault injection techniques allow an adversary to attack cryptographic devices by
inducing errors of any multiplicity. The induced errors can affect any part of the circuit …

[PDF][PDF] Efficiency of Cryptography for Multi-Algorithm Computation on Dedicated Structures

N Sklavos, JC Resende, R Chaves… - … on Modern Circuits …, 2015 - mocast.physics.auth.gr
Currently, the more efficient implementations for cryptographic engines are dedicated
structures and only allow processing a single algorithm. On the other hand the existing multi …

[HTML][HTML] 一种混合粒度奇偶校验故障注入检测方法

王沛晶, 刘强 - 2019 - html.rhhz.net
为了实现高效的抗故障注入攻击, 提出了一种混合粒度奇偶校验故障注入检测方法.
传统奇偶校验检测方法为每n 比特设置一个奇偶位, 表示该n 比特的奇偶性. 随着n 的减小 …

Fault-based attacks on cryptographic hardware

I Polian, M Kreuzer - … Symposium on Design and Diagnostics of …, 2013 - ieeexplore.ieee.org
Mobile and embedded systems increasingly process sensitive data, ranging from personal
information including health records or financial transactions to parameters of technical …

Fault tolerant non-linear techniques for scalar multiplication in ECC

Z Saffar, S Mohammadi - 2019 16th International ISC (Iranian …, 2019 - ieeexplore.ieee.org
Elliptic curve cryptography (ECC) has shorter key length than other asymmetric cryptography
algorithms such as RSA with the same security level. Existing faults in cryptographic …