Configuration Tampering of BRAM-based AES Implementations on FPGAs
暂无分享,去创建一个
[1] Tim Kerins,et al. A Cautionary Note on Weak Implementations of Block Ciphers , 2006 .
[2] Sylvain Guilley,et al. From cryptography to hardware: analyzing and protecting embedded Xilinx BRAM for cryptographic applications , 2013, Journal of Cryptographic Engineering.
[3] Debdeep Mukhopadhyay,et al. Fault Attacks on AES and Their Countermeasures , 2016 .
[4] Jens-Peter Kaps,et al. Investigation of DPA Resistance of Block RAMs in Cryptographic Implementations on FPGAs , 2010, 2010 International Conference on Reconfigurable Computing and FPGAs.
[5] Santiago Sánchez-Solano,et al. AES T-Box tampering attack , 2015, Journal of Cryptographic Engineering.
[6] Jason Moore,et al. Authenticated encryption for FPGA bitstreams , 2011, FPGA '11.
[7] Christof Paar,et al. FPGA Trojans Through Detecting and Weakening of Cryptographic Primitives , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[8] James F. Dray,et al. Advanced Encryption Standard (AES) , 2001 .
[9] Christof Paar,et al. Bitstream Fault Injections (BiFI)–Automated Fault Attacks Against SRAM-Based FPGAs , 2018, IEEE Transactions on Computers.