Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of Mathematical Cryptology"
DOI: 10.1515/jmc-2019-0030
Abstract: Abstract Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attacks. Over the past few…
read more here.
Keywords:
ring extension;
fault attacks;
extension method;
Sign Up to like & get
recommendations!
2
Published in 2023 at "Micromachines"
DOI: 10.3390/mi14061129
Abstract: The hash function KECCAK integrity algorithm is implemented in cryptographic systems to provide high security for any circuit requiring integrity and protect the transmitted data. Fault attacks, which can extricate confidential data, are one of…
read more here.
Keywords:
hardware;
fault detection;
detection;
fault ... See more keywords