D Toprakhisar, S Nikova, V Nikov - Cryptographers' Track at the RSA …, 2024 - Springer
Since the first fault attack by Boneh et al. in 1997, various physical fault injection mechanisms have been explored to induce errors in electronic systems. Subsequent fault …
Abstract The beyond 5G (B5G)/6G eras promise to revolutionize wireless communication with unprecedented speeds. However, ensuring security across hardware and software is a …
AK Kundu, S Ghosh, D Saha, M Rahman - International Conference on …, 2023 - Springer
The division property introduced by Todo in Crypto 2015 is one of the most versatile tools in the arsenal of a cryptanalyst which has given new insights into many ciphers primarily from …
The rising tide of data breaches targeting large data storage centres and servers has raised serious privacy and security concerns. Homomorphic Encryption schemes offer an effective …
SKINNY is a lightweight tweakable block cipher that for the first time introduced in CRYPTO 2016. SKINNY is considered in two block sizes: 64 bits and 128 bits, as well as three …
AA Beigizad, H Soleimany, S Zarei… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Numerous fault models with distinct characteristics and effects have been developed. The costs, repeatability, and practicability of these models should be assessed. Moreover, there …
We explore a relatively lightweight scheme to prevent key recovery by fault attacks on the Advanced Encryption Standard (AES) cipher. We employ a transformed key (derived from …
Differential fault analysis, a kind of active non-invasive attack, is an effective way of analyzing cryptographic primitives that have lately earned more attention. In this study, we …