A comparative survey of symmetric and asymmetric key cryptography

S Chandra, S Paira, SS Alam… - … conference on electronics …, 2014 - ieeexplore.ieee.org
Network security is an important aspect of information sharing. Attempts have been made to
remove various insecurities over internet. For this, many technological implementations and …

CRC-oriented error detection architectures of post-quantum cryptography niederreiter key generator on FPGA

A Cintas-Canto, M Mozaffari-Kermani… - 2022 IEEE Nordic …, 2022 - ieeexplore.ieee.org
Providing error detection constructions for Internet of nano-Things in constrained
applications is of prominent importance. The Niederreiter cryptosystem falls into the category …

Concurrent structure-independent fault detection schemes for the advanced encryption standard

M Mozaffari-Kermani… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
The Advanced Encryption Standard (AES) has been lately accepted as the symmetric
cryptography standard for confidential data transmission. However, the natural and …

Security analysis of concurrent error detection against differential fault analysis

X Guo, D Mukhopadhyay, C Jin, R Karri - Journal of Cryptographic …, 2015 - Springer
Differential fault analysis (DFA) poses a significant threat to advanced encryption standard
(AES). Only a single faulty ciphertext is required to extract the secret key. Concurrent error …

A lightweight high-performance fault detection scheme for the advanced encryption standard using composite fields

M Mozaffari-Kermani… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
The faults that accidently or maliciously occur in the hardware implementations of the
Advanced Encryption Standard (AES) may cause erroneous encrypted/decrypted output …

Recomputing with permuted operands: A concurrent error detection approach

X Guo, R Karri - IEEE Transactions on Computer-Aided Design …, 2013 - ieeexplore.ieee.org
Naturally occurring and maliciously injected faults reduce the reliability of cryptographic
hardware and may leak confidential information. We develop a concurrent error detection …

A high-performance fault diagnosis approach for the AES SubBytes utilizing mixed bases

M Mozaffari-Kermani… - 2011 Workshop on Fault …, 2011 - ieeexplore.ieee.org
The Sub Bytes (S-boxes) is the only non-linear transformation in the encryption of the
Advanced Encryption Standard (AES), occupying more than half of its hardware …

Fault attacks on AES and their countermeasures

S Ali, X Guo, R Karri, D Mukhopadhyay - Secure System Design and …, 2016 - Springer
Fault Attacks exploit malicious or accidental faults injected during the computation of a
cryptographic algorithm. Combining the seminal idea by Boneh, DeMillo and Lipton with …

Error Detection Architectures for Ring Polynomial Multiplication and Modular Reduction of Ring-LWE in Benchmarked on ASIC

A Sarker, MM Kermani… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Ring learning with error (ring-LWE) within lattice-based cryptography is a promising
cryptographic scheme for the post-quantum era. In this article, we explore efficient error …

Reliable hardware architectures for the third-round SHA-3 finalist Grostl benchmarked on FPGA platform

M Mozaffari-Kermani… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
The third round of competition for the SHA-3 candidates is ongoing to select the winning
function in 2012. Although much attention has been devoted to the performance and security …