Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures

A Barenghi, L Breveglieri, I Koren… - Proceedings of the …, 2012 - ieeexplore.ieee.org
Implementations of cryptographic algorithms continue to proliferate in consumer products
due to the increasing demand for secure transmission of confidential information. Although …

[图书][B] Fault-tolerant systems

I Koren, CM Krishna - 2020 - books.google.com
Fault-Tolerant Systems, Second Edition, is the first book on fault tolerance design utilizing a
systems approach to both hardware and software. No other text takes this approach or offers …

CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks

C Beierle, G Leander, A Moradi… - IACR Transactions on …, 2019 - orbilu.uni.lu
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …

Cryptanalysis of DES implemented on computers with cache

Y Tsunoo, T Saito, T Suzaki, M Shigeri… - … and Embedded Systems …, 2003 - Springer
This paper presents the results of applying an attack against the Data Encryption Standard
(DES) implemented in some applications, using side-channel information based on CPU …

Hardware designer's guide to fault attacks

D Karaklajić, JM Schmidt… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Hardware designers invest a significant design effort when implementing computationally
intensive cryptographic algorithms onto constrained embedded devices to match the …

Emerging security mechanisms for medical cyber physical systems

O Kocabas, T Soyata, MK Aktas - IEEE/ACM transactions on …, 2016 - ieeexplore.ieee.org
The following decade will witness a surge in remote health-monitoring systems that are
based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) …

ParTI–towards combined hardware countermeasures against side-channel and fault-injection attacks

T Schneider, A Moradi, T Güneysu - … , Santa Barbara, CA, USA, August 14 …, 2016 - Springer
Side-channel analysis and fault-injection attacks are known as major threats to any
cryptographic implementation. Hardening cryptographic implementations with appropriate …

[PDF][PDF] 密码产品的侧信道分析与评估

陈华, 习伟, 范丽敏, 焦志鹏, 冯婧怡 - 电子与信息学报, 2020 - jeit.ac.cn
作为一类重要的信息安全产品, 密码产品中所使用的密码技术保障了信息的保密性,
完整性和不可抵赖性. 而侧信道攻击是针对密码产品的一类重要的安全威胁 …

Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard

M Karpovsky, KJ Kulikowski… - … on Dependable Systems …, 2004 - ieeexplore.ieee.org
We present a method of protecting a hardware implementation of the advanced encryption
standard (AES) against a side-channel attack known as differential fault analysis attack. The …

Simple error detection methods for hardware implementation of advanced encryption standard

CH Yen, BF Wu - IEEE transactions on computers, 2006 - ieeexplore.ieee.org
In order to prevent the Advanced Encryption Standard (AES) from suffering from differential
fault attacks, the technique of error detection can be adopted to detect the errors during …