搜索结果: 1-15 共查到“军事学 Fault Attack”相关记录25条 . 查询时间(0.062 秒)
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
Lattice-based cryptography fault attacks countermeasures
2019/3/1
Lattice-based cryptography is one of the leading candidates for NIST's post-quantum standardisation effort, providing efficient key encapsulation and signature schemes. Most of these schemes base thei...
Grafting Trees: a Fault Attack against the SPHINCS framework
SPHINCS Fault attacks Hash-based signatures
2018/1/30
Because they require no assumption besides the preimage or collision resistance of hash functions, hash-based signatures are a unique and very attractive class of post-quantum primitives. Among them, ...
A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20
ChaCha ARX cipher Laser
2017/11/13
This paper presents the first practical fault attack on the ChaCha family of addition-rotation-XOR (ARX)-based stream ciphers. ChaCha has recently been deployed for speeding up and strengthening HTTPS...
Fault attack is one of the most efficient side channel attacks and has attracted much attention in recent public cryptographic literatures. In this work we introduce a fault attack on the authenticate...
Differential Fault Attack on Grain v1, ACORN v3 and Lizard
Differential Fault Attack Stream Cipher Grain v1
2017/7/14
Differential Fault Attack (DFA) is presently a very well known technique to evaluate security of a stream cipher. This considers that the stream cipher can be weakened by injection of the fault. In th...
We present the first fault attack on cryptosystems based on supersingular isogenies. During the computation of the auxiliary points, the attack aims to change the base point to a random point on the c...
Lightweight stream ciphers have received serious attention in the last few years. The present design paradigm considers very small state (less than twice the key size) and use of the secret key bits d...
Lightweight Fault Attack Resistance in Software Using Intra-Instruction Redundancy
Fault attacks Fault resistance Intra-instruction redundancy
2016/12/10
Fault attack countermeasures can be implemented by storing or computing sensitive data in redundant form, such that the faulty data can be detected and restored. We present a class of lightweight, por...
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
Pairing-Based Cryptography Fault Attacks eta Pairing
2016/1/8
Several fault attacks against pairing-based cryptography have been described theoretically in recent years.
Interestingly, none of these has been practically evaluated. We accomplish this task and pr...
Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses
Fault attacks branch misses performance counters
2016/1/6
Performance monitors are provided in modern day computers for observing various features of the underlying microarchitectures. However the combination of underlying micro-architectural features and pe...
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack
Cryptanalysis Fault Attack Key-stream
2016/1/3
Design of secure light-weight stream ciphers is an important
area in cryptographic hardware & embedded systems and a very
recent design by Armknecht and Mikhalev (FSE 2015) has received serious
att...
Differential Fault Attack against Grain family with very few faults and minimal assumptions
Differential Fault Attack Grain v1
2014/3/10
The series of published works, related to Differential Fault Attack (DFA) against the Grain family, require (i) quite a large number (hundreds) of faults (around $n \ln n$, where $n = 80$ for Grain v1...
A Differential Fault Attack on MICKEY 2.0
implementation / eStream Fault attacks MICKEY 2.0 Stream Cipher
2013/2/21
In this paper we present a differential fault attack on the stream cipher MICKEY 2.0 which is in eStream's hardware portfolio. While fault attacks have already been reported against the other two eStr...
Differential Fault Attack on the PRINCE Block Cipher
secret-key cryptography / lightweight cipher PRINCE block cipher
2013/2/21
PRINCE is a new lightweight block cipher proposed at the ASIACRYPT'2012 conference. In this paper two observations on the linear layer of the cipher are presented. Based on the observations a differen...
Fault Attack against Miller's algorithm
Pairing Based Cryptography Side Channel Attacks Fault attacks
2012/6/14
We complete the study of [23] and [27] about Miller's algorithm. Miller's algorithm is a central step to compute the Weil, Tate and Ate pairings. The aim of this article is to analyze the weakness of ...