Stati: Protecting against fault attacks using stable threshold implementations
S Dhooghe, A Ovchinnikov, D Toprakhisar - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Fault attacks impose a serious threat against the practical implementations of cryptographic
algorithms. Statistical Ineffective Fault Attacks (SIFA), exploiting the dependency between …
algorithms. Statistical Ineffective Fault Attacks (SIFA), exploiting the dependency between …
Saturnin-Short 轻量级认证加密算法的统计无效故障分析
李玮, 刘春, 谷大武, 孙文倩, 高建宁, 秦梦洋 - 通信学报, 2023 - infocomm-journal.com
面向随机单字节故障模型和唯密文攻击假设, 提出了一种针对Saturnin-Short
算法的统计无效故障分析方法. 该方法基于统计分布和无效状态分析, 通过结合故障注入前后 …
算法的统计无效故障分析方法. 该方法基于统计分布和无效状态分析, 通过结合故障注入前后 …
SoK: Parameterization of Fault Adversary Models Connecting Theory and Practice
D Toprakhisar, S Nikova, V Nikov - Cryptographers' Track at the RSA …, 2024 - Springer
Since the first fault attack by Boneh et al. in 1997, various physical fault injection
mechanisms have been explored to induce errors in electronic systems. Subsequent fault …
mechanisms have been explored to induce errors in electronic systems. Subsequent fault …
Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers—Rocca, Rocca-S and AEGIS
Abstract The beyond 5G (B5G)/6G eras promise to revolutionize wireless communication
with unprecedented speeds. However, ensuring security across hardware and software is a …
with unprecedented speeds. However, ensuring security across hardware and software is a …
Divide and Rule: DiFA-Division Property Based Fault Attacks on PRESENT and GIFT
The division property introduced by Todo in Crypto 2015 is one of the most versatile tools in
the arsenal of a cryptanalyst which has given new insights into many ciphers primarily from …
the arsenal of a cryptanalyst which has given new insights into many ciphers primarily from …
SASTA: Ambushing Hybrid Homomorphic Encryption Schemes with a Single Fault
The rising tide of data breaches targeting large data storage centres and servers has raised
serious privacy and security concerns. Homomorphic Encryption schemes offer an effective …
serious privacy and security concerns. Homomorphic Encryption schemes offer an effective …
Practical Differential Fault Analysis on SKINNY.
SKINNY is a lightweight tweakable block cipher that for the first time introduced in CRYPTO
2016. SKINNY is considered in two block sizes: 64 bits and 128 bits, as well as three …
2016. SKINNY is considered in two block sizes: 64 bits and 128 bits, as well as three …
Linked Fault Analysis
AA Beigizad, H Soleimany, S Zarei… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Numerous fault models with distinct characteristics and effects have been developed. The
costs, repeatability, and practicability of these models should be assessed. Moreover, there …
costs, repeatability, and practicability of these models should be assessed. Moreover, there …
A Provably Secure Scheme to Prevent Master Key Recovery by Fault Attack on AES Hardware
S Swaroopa, S Manivannan… - IEEE Embedded …, 2024 - ieeexplore.ieee.org
We explore a relatively lightweight scheme to prevent key recovery by fault attacks on the
Advanced Encryption Standard (AES) cipher. We employ a transformed key (derived from …
Advanced Encryption Standard (AES) cipher. We employ a transformed key (derived from …
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher.
Differential fault analysis, a kind of active non-invasive attack, is an effective way of
analyzing cryptographic primitives that have lately earned more attention. In this study, we …
analyzing cryptographic primitives that have lately earned more attention. In this study, we …