A survey on fault attacks on symmetric key cryptosystems
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
{CLKSCREW}: Exposing the perils of {Security-Oblivious} energy management
The need for power-and energy-efficient computing has resulted in aggressive cooperative
hardware-software energy management mechanisms on modern commodity devices. Most …
hardware-software energy management mechanisms on modern commodity devices. Most …
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis
C Shepherd, K Markantonakis, N Van Heijningen… - Computers & …, 2021 - Elsevier
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …
Oops..! I Glitched It Again! How to {Multi-Glitch} the {Glitching-Protections} on {ARM}{TrustZone-M}
XM Saß, R Mitev, AR Sadeghi - 32nd USENIX Security Symposium …, 2023 - usenix.org
Voltage Fault Injection (VFI), also known as power glitching, has proven to be a severe
threat to real-world systems. In VFI attacks, the adversary disturbs the power-supply of the …
threat to real-world systems. In VFI attacks, the adversary disturbs the power-supply of the …
Lattice-based signature schemes and their sensitivity to fault attacks
Due to their high efficiency and their strong security properties, lattice-based cryptographic
schemes seem to be a very promising post-quantum replacement for currently used public …
schemes seem to be a very promising post-quantum replacement for currently used public …
Loop-abort faults on supersingular isogeny cryptosystems
A Gélin, B Wesolowski - … , PQCrypto 2017, Utrecht, The Netherlands, June …, 2017 - Springer
Cryptographic schemes based on supersingular isogenies have become an active area of
research in the field of post-quantum cryptography. We investigate the resistance of these …
research in the field of post-quantum cryptography. We investigate the resistance of these …
Fault attacks in symmetric key cryptosystems
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP
VQ Ulitzsch, S Marzougui, A Bagia… - IACR Transactions on …, 2023 - tches.iacr.org
At SAC 2016, Espitau et al. presented a loop-abort fault attack against lattice-based
signature schemes following the Fiat–Shamir with aborts paradigm. Their attack recovered …
signature schemes following the Fiat–Shamir with aborts paradigm. Their attack recovered …
BEARZ attack FALCON: implementation attacks with countermeasures on the FALCON signature scheme
S McCarthy, J Howe, N Smyth, S Brannigan… - Cryptology ePrint …, 2019 - eprint.iacr.org
Post-quantum cryptography is an important and growing area of research due to the threat of
quantum computers, as recognised by the National Institute of Standards and Technology …
quantum computers, as recognised by the National Institute of Standards and Technology …
Classical and physical security of symmetric key cryptographic algorithms
A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …
electronic communication. The symmetric key algorithms, known as the ciphers, are to …