Reliable architectures for finite field multipliers using cyclic codes on FPGA utilized in classic and post-quantum cryptography

A Cintas-Canto, MM Kermani… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Fault detection is becoming greatly important in protecting cryptographic designs that can
suffer from both natural or malicious faults. Finite fields over are widely used in such …

Sofi: Security property-driven vulnerability assessments of ics against fault-injection attacks

H Wang, H Li, F Rahman… - … on Computer-Aided …, 2021 - ieeexplore.ieee.org
Fault-injection attacks have become a major concern for hardware designs, primarily due to
their powerful capability in tampering with critical locations in a device to cause violation of …

Revisiting fault adversary models–hardware faults in theory and practice

J Richter-Brockmann, P Sasdrich… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Fault injection attacks are considered as powerful techniques to successfully attack
embedded cryptographic implementations since various fault injection mechanisms from …

VERICA-Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering

J Richter-Brockmann, J Feldtkeller, P Sasdrich… - Cryptology ePrint …, 2022 - eprint.iacr.org
Physical attacks, including passive Side-Channel Analysis and active Fault Injection
Analysis, are considered among the most powerful threats against physical cryptographic …

Impeccable circuits II

AR Shahmirzadi, S Rasoolzadeh… - 2020 57th ACM/IEEE …, 2020 - ieeexplore.ieee.org
Protection against active physical attacks is of serious concerns of cryptographic hardware
designers. Introduction of SIFA invalidating several previously-thought-effective counter …

Challenges and opportunities of security-aware EDA

J Feldtkeller, P Sasdrich, T Güneysu - ACM Transactions on Embedded …, 2023 - dl.acm.org
The foundation of every digital system is based on hardware in which security, as a core
service of many applications, should be deeply embedded. Unfortunately, the knowledge of …

Fault attacks on access control in processors: Threat, formal analysis and microarchitectural mitigation

ALD Antón, J Müller, MR Fadiheh, D Stoffel… - IEEE Access, 2023 - ieeexplore.ieee.org
Process isolation is a key component of the security architecture in any hardware/software
system. However, even when implemented correctly and comprehensively at the software …

Learn from your faults: leakage assessment in fault attacks using deep learning

S Saha, M Alam, A Bag, D Mukhopadhyay… - Journal of …, 2023 - Springer
Generic vulnerability assessment of cipher implementations against Fault Attacks (FA) is a
largely unexplored research area. Security assessment against FA is critical for FA …

Classical and physical security of symmetric key cryptographic algorithms

A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …

Circuit masking: from theory to standardization, a comprehensive survey for hardware security researchers and practitioners

A Covic, F Ganji, D Forte - arXiv preprint arXiv:2106.12714, 2021 - arxiv.org
Side-channel attacks extracting sensitive data from implementations have been considered
a major threat to the security of cryptographic schemes. This has elevated the need for …