搜索结果: 1-15 共查到“军事学 Fault Analysis”相关记录45条 . 查询时间(0.099 秒)
A Study of Persistent Fault Analysis
Fault Analysis PFA Feistel Networks Reverse Engineering
font style='font-size:12px;'>
2019/9/19
Persistent faults mark a new class of injections that perturb lookup tables within block ciphers with the overall goal of recovering the encryption key. Unlike earlier fault types persistent faults re...
Table Redundancy Method for Protecting against Differential Fault Analysis in the White-box Cryptography
Differential fault analysis white-box cryptography countermeasure
font style='font-size:12px;'>
2019/8/26
Differential Fault Analysis (DFA) intentionally injects some fault into the encryption process and analyzes a secret key from the mathematical relationship between faulty and fault-free ciphertexts. E...
Differential Fault Analysis of NORX
secret-key cryptography DFA
font style='font-size:12px;'>
2019/7/8
In recent literature, there has been a particular interest in studying nonce based AE schemes in the light of fault based attacks as they seem to present an automatic protection against Differential F...
A Countermeasure Against Statistical Ineffective Fault Analysis
fault injection attacks ineffective fault analysis countermeasures
font style='font-size:12px;'>
2019/5/21
Current state-of-the-art countermeasures against Fault Injection Attacks (FIA) provide good protection against analysis methods that require the faulty ciphertext to derive the secret information, suc...
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis
fault attacks masking persistent
font style='font-size:12px;'>
2019/1/9
Persistent fault analysis (PFA) was proposed at CHES 2018 as a novel fault analysis technique. It was shown to completely defeat standard redundancy based countermeasure against fault analysis. In thi...
Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms
differential fault analysis cryptographic fault attacks automation
font style='font-size:12px;'>
2018/6/5
Emerging technologies with the requirement of small size and portability, such as Internet-of-Things devices, represent a good target for physical attacks, e.g., fault attacks. These attacks often aim...
Differential Fault Analysis of Rectangle-80
RECTANGLE-80 secret-key cryptography
font style='font-size:12px;'>
2018/5/14
We present various differential fault attack schemes for the RECTANGLE-80 and demonstrate how initially we started from a 80-bit fault to a single word fault scheme. This was mainly due to a different...
Fault Analysis of the KTANTAN Family of Block Ciphers: A Revisited Work of Fault Analysis of the KATAN Family of Block Ciphers
block ciphers cryptanalysis implementation
font style='font-size:12px;'>
2018/3/12
This paper investigates the security of the KTANTAN block cipher against differential fault analysis. This attack is considered to be first side channel analysis of KTANTAN in the literature. KTANTAN ...
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers
DFA DPA PRESENT
font style='font-size:12px;'>
2017/11/13
We present the first practically realizable side-channel assisted fault attack on PRESENT, that can retrieve the last round key efficiently using single nibble faults. The attack demonstrates how side...
Differential Fault Analysis of SHA-3 under Relaxed Fault Models
SHA-3 DFA
font style='font-size:12px;'>
2017/9/13
Keccak-based algorithms such as Secure Hash Algorithm-3 (SHA-3) will be widely used in crypto systems, and evaluating their security against different kinds of attacks is vitally important. This paper...
Automated Fault Analysis of Assembly Code (With a Case Study on PRESENT Implementation)
automated fault attack software implementations assembly code
font style='font-size:12px;'>
2017/9/1
Fault injection attack models are normally determined by analyzing the cipher structure and finding exploitable spots in non-linear and diffusion layers. However, this level of abstraction is often to...
Differential Fault Analysis Automation
Block Cipher Differential Fault Analysis AES
font style='font-size:12px;'>
2017/7/11
Characterization of all possible faults in a cryptosystem exploitable for fault attacks is a problem which is of both theoretical and practical interest for the cryptographic community. The complete k...
Algebraic Fault Analysis of SHA-3
SHA-3 Keccak Algebraic fault analysis
font style='font-size:12px;'>
2017/2/20
This paper presents an efficient algebraic fault analysis on all four modes of SHA-3 under relaxed fault models. This is the first work to apply algebraic techniques on fault analysis of SHA-3. Result...
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
AES differential fault analysis side-channel attacks
font style='font-size:12px;'>
2016/12/8
Differential fault analysis attack is a kind of serious threat to cryptographic devices.
Previous protection schemes for crypto devices are not designed specifically against this kind of
attacks. At...
Differential Fault Analysis of SHA3-224 and SHA3-256
SHA-3 Keccak Fault attacks
font style='font-size:12px;'>
2016/7/20
The security of SHA-3 against different kinds of attacks are of vital importance for crypto systems with SHA-3 as the security engine. In this paper, we look into the differential fault analysis of SH...