Articles with "fault attacks" as a keyword



Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Mathematical Cryptology"

DOI: 10.1515/jmc-2019-0030

Abstract: Abstract Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attacks. Over the past few… read more here.

Keywords: ring extension; fault attacks; extension method;

High-Speed Hardware Architecture Based on Error Detection for KECCAK

Sign Up to like & get
recommendations!
Published in 2023 at "Micromachines"

DOI: 10.3390/mi14061129

Abstract: The hash function KECCAK integrity algorithm is implemented in cryptographic systems to provide high security for any circuit requiring integrity and protect the transmitted data. Fault attacks, which can extricate confidential data, are one of… read more here.

Keywords: hardware; fault detection; detection; fault ... See more keywords