A mesh check-sum ABFT scheme for stream ciphers
暂无分享,去创建一个
[1] Israel Koren,et al. An efficient hardware-based fault diagnosis scheme for AES: performances and cost , 2004, 19th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 2004. DFT 2004. Proceedings..
[2] Keshab K. Parhi,et al. High-speed VLSI architectures for the AES algorithm , 2004, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[3] William Stallings,et al. Cryptography and network security , 1998 .
[4] Jacob A. Abraham,et al. Algorithm-Based Fault Tolerance for Matrix Operations , 1984, IEEE Transactions on Computers.
[5] Israel Koren,et al. Detecting and locating faults in VLSI implementations of the Advanced Encryption Standard , 2003, Proceedings 18th IEEE Symposium on Defect and Fault Tolerance in VLSI Systems.
[6] Wen-Ai Jackson,et al. Projective aspects of the AES inversion , 2007, Des. Codes Cryptogr..
[7] Chang N. Zhang,et al. Integrated approach for fault tolerance and digital signature in RSA , 1999 .
[8] Matthew J. B. Robshaw,et al. Key-Dependent S-Boxes and Differential Cryptanalysis , 2002, Des. Codes Cryptogr..
[9] I. Reed,et al. Polynomial Codes Over Certain Finite Fields , 1960 .
[10] Israel Koren,et al. Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard , 2003, IEEE Trans. Computers.
[11] James Lee Hafner,et al. HoVer Erasure Codes For Disk Arrays , 2006, International Conference on Dependable Systems and Networks (DSN'06).
[12] Jehoshua Bruck,et al. EVENODD: an optimal scheme for tolerating double disk failures in RAID architectures , 1994, ISCA '94.
[13] Jay J. Wylie,et al. Determining Fault Tolerance of XOR-Based Erasure Codes Efficiently , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[14] James Lee Hafner,et al. WEAVER codes: highly fault tolerant erasure codes for storage systems , 2005, FAST'05.
[15] Alex Biryukov,et al. Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers , 2000, ASIACRYPT.
[16] Adi Shamir,et al. Fault Analysis of Stream Ciphers , 2004, CHES.
[17] Ahmad A. Al-Yamani,et al. Performance evaluation of checksum-based ABFT , 2001, Proceedings 2001 IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems.
[18] Ingrid Verbauwhede,et al. Energy, performance, area versus security trade-offs for stream ciphers , 2004 .
[19] D.Y. Yu,et al. A Low-cost and High Efficiency Architecture of AES Crypto-engine , 2007, 2007 Second International Conference on Communications and Networking in China.