Preventing fault attacks using fault randomisation with a case study on AES

S Ghosh, D Saha, A Sengupta… - … Journal of Applied …, 2017 - inderscienceonline.com
Fault attacks are one of the most effective side-channel attacks on symmetric key ciphers.
Over the years a variety of countermeasure techniques have been proposed to prevent this …

[PDF][PDF] CeTrivium: A Stream Cipher Based on Cellular Automata for Securing Real-TimeMultimedia Transmission.

OS Younes, A Alharbi, A Yasseen… - … Systems Science & …, 2023 - cdn.techscience.cn
Due to their significant correlation and redundancy, conventional block cipher cryptosystems
are not efficient in encrypting multimedia data. Stream ciphers based on Cellular Automata …

A novel SPN-based video steganographic scheme using Sudoku puzzle for secured data hiding

S Jana, AK Maji, RK Pal - Innovations in Systems and Software …, 2019 - Springer
Video steganography is the method of hiding the presence of data within the cover video. In
this paper, a novel video steganography technique is revealed, where with the help of …

Carpenter: a cellular automata based resilient pentavalent stream cipher

R Lakra, A John, J Jose - … Conference on Cellular Automata for Research …, 2018 - Springer
Cellular Automata (CA) are a self reproducing model widely accepted for their applications
in pattern recognition, VLSI design, error correcting codes, cryptography etc. They have also …

A symmetric key-based image encryption scheme

J Bahumik, S De - Proceedings of the International Conference on …, 2018 - Springer
In this information age, secure transmission and storage of digital image are an important
requirement. Due to its better performance, symmetric key algorithms are popularly …

On the design of stream ciphers with Cellular Automata having radius= 2

A John, R Lakra, J Jose - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Cellular Automata (CA) have recently evolved as a good cryptographic primitive. It plays an
important role in the construction of new fast, ef&# 64257; cient and secure stream ciphers …

FResCA: a fault-resistant cellular automata based stream cipher

J Jose, D Roy Chowdhury - … Conference on Cellular Automata for Research …, 2016 - Springer
Grain is a stream cipher suitable for restricted hardware environments. The cipher is
particularly vulnerable to fault attacks. It has been shown that fault injection in either the …

A New Image Encryption Based on Two Chaotic Maps and Affine Transform

S De, J Bhaumik, D Giri - International Conference on Computational …, 2022 - Springer
In the present era, the non-linear and dynamic phenomenon of chaos play a vital role in
image encryption. In this paper, we proposes a new image encryption method based on …

[PDF][PDF] A New SPN Type Architecture to Strengthen Block Cipher Against Fault Attack.

G Maity, J Bhaumik, A Kundu - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Abstract In recent years, Differential Fault Analysis (DFA) has been proven as the most
efficient technique to attack any block cipher by introducing a computational error. In this …

Improving security of SPN-type block cipher against fault attack

G Maity, S Jana, M Mantri, J Bhaumik - International Conference on …, 2017 - Springer
Differential fault attack (DFA) is the most popular technique often used to attack physical
implementation of block cipher by introducing a computational error. In this paper, a new …