A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

{CLKSCREW}: Exposing the perils of {Security-Oblivious} energy management

A Tang, S Sethumadhavan, S Stolfo - 26th USENIX Security Symposium …, 2017 - usenix.org
The need for power-and energy-efficient computing has resulted in aggressive cooperative
hardware-software energy management mechanisms on modern commodity devices. Most …

Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis

C Shepherd, K Markantonakis, N Van Heijningen… - Computers & …, 2021 - Elsevier
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …

Oops..! I Glitched It Again! How to {Multi-Glitch} the {Glitching-Protections} on {ARM}{TrustZone-M}

XM Saß, R Mitev, AR Sadeghi - 32nd USENIX Security Symposium …, 2023 - usenix.org
Voltage Fault Injection (VFI), also known as power glitching, has proven to be a severe
threat to real-world systems. In VFI attacks, the adversary disturbs the power-supply of the …

Lattice-based signature schemes and their sensitivity to fault attacks

N Bindel, J Buchmann, J Krämer - 2016 Workshop on Fault …, 2016 - ieeexplore.ieee.org
Due to their high efficiency and their strong security properties, lattice-based cryptographic
schemes seem to be a very promising post-quantum replacement for currently used public …

Loop-abort faults on supersingular isogeny cryptosystems

A Gélin, B Wesolowski - … , PQCrypto 2017, Utrecht, The Netherlands, June …, 2017 - Springer
Cryptographic schemes based on supersingular isogenies have become an active area of
research in the field of post-quantum cryptography. We investigate the resistance of these …

Fault attacks in symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP

VQ Ulitzsch, S Marzougui, A Bagia… - IACR Transactions on …, 2023 - tches.iacr.org
At SAC 2016, Espitau et al. presented a loop-abort fault attack against lattice-based
signature schemes following the Fiat–Shamir with aborts paradigm. Their attack recovered …

BEARZ attack FALCON: implementation attacks with countermeasures on the FALCON signature scheme

S McCarthy, J Howe, N Smyth, S Brannigan… - Cryptology ePrint …, 2019 - eprint.iacr.org
Post-quantum cryptography is an important and growing area of research due to the threat of
quantum computers, as recognised by the National Institute of Standards and Technology …

Classical and physical security of symmetric key cryptographic algorithms

A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …