Comparative realization of error detection schemes for implementations of mixcolumns in lightweight cryptography
暂无分享,去创建一个
[1] Reza Azarderakhsh,et al. Fault Detection Architectures for Post-Quantum Cryptographic Stateless Hash-Based Secure Signatures Benchmarked on ASIC , 2016, ACM Trans. Embed. Comput. Syst..
[2] Thomas Peyrin,et al. The PHOTON Family of Lightweight Hash Functions , 2011, IACR Cryptol. ePrint Arch..
[3] Debdeep Mukhopadhyay,et al. Security analysis of concurrent error detection against differential fault analysis , 2014, Journal of Cryptographic Engineering.
[4] Arash Reyhani-Masoleh,et al. A Lightweight High-Performance Fault Detection Scheme for the Advanced Encryption Standard Using Composite Fields , 2011, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[5] Arash Reyhani-Masoleh,et al. Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard , 2010, IEEE Transactions on Computers.
[6] Reza Azarderakhsh,et al. Reliable and Error Detection Architectures of Pomaranch for False-Alarm-Sensitive Cryptographic Applications , 2015, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[7] Debdeep Mukhopadhyay,et al. Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers , 2017, IEEE Transactions on Information Forensics and Security.
[8] Daniel Augot,et al. Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes , 2014, FSE.
[9] Reza Azarderakhsh,et al. Fault-Resilient Lightweight Cryptographic Block Ciphers for Secure Embedded Systems , 2014, IEEE Embedded Systems Letters.
[10] Ramesh Karri,et al. Recomputing with Permuted Operands: A Concurrent Error Detection Approach , 2013, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[11] Debdeep Mukhopadhyay,et al. A Biased Fault Attack on the Time Redundancy Countermeasure for AES , 2015, COSADE.
[12] Nahid Farhady Ghalaty,et al. Differential Fault Intensity Analysis , 2014, 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[13] Arash Reyhani-Masoleh,et al. Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm , 2014, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[14] Reza Azarderakhsh,et al. Reliable Concurrent Error Detection Architectures for Extended Euclidean-Based Division Over ${\rm GF}(2^{m})$ , 2014, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[15] Nahid Farhady Ghalaty,et al. Analyzing the Efficiency of Biased-Fault Based Attacks , 2016, IEEE Embedded Systems Letters.
[16] Arash Reyhani-Masoleh,et al. A High-Performance Fault Diagnosis Approach for the AES SubBytes Utilizing Mixed Bases , 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.