SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
نویسندگان
چکیده
منابع مشابه
Symmetric Key Cryptography on Modern Graphics Hardware
GPUs offer a tremendous amount of computational bandwidth that was until now largely unusable for cryptographic computations due to a lack of integer arithmetic and user-friendly programming APIs that provided direct access to the GPU’s computing resources. The latest generation of GPUs, which introduces integer/binary arithmetic, has been leveraged to create several implementations of the AES ...
متن کاملDNA Cryptography Based on Symmetric Key Exchange
DNA cryptography is a technology of bio science to encrypt large message in compact volume. Now a day, researchers are going to research in the field of secure data transmission. Hiding the encrypted message is important part of Cryptography. Hidden message is in the form of DNA sequence, image, audio and video, which is used to prevent important data from the intruders. In this paper, a new cr...
متن کاملAnalysis on AES Algorithm using symmetric cryptography
In this paper we present the protection of long lived private key & public key using cryptographic schemes is one of the most important issues for information security. Any cryptographic scheme that reveals private key and public key will soon its security absolutely disintegrates. Public key are used in two different based, i.e. RSA and elliptic curve cryptography both are modular based arithm...
متن کاملLeakage-Resilient Symmetric Cryptography
. In Moni Naor, editor, Theory of Cryptography, First Theory of Cryp-tography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004,Proceedings, volume 2951 of Lecture Notes in Computer Science, pages 278–296.Springer, 2004.55. Andrew Moss, Elisabeth Oswald, Dan Page, and Michael Tunstall. Compiler assisted masking. In Prouff and Schaumont [66], pages 58–75.56. Moni...
متن کامل14021 Symmetric Cryptography
From 05.01.2014 to 10.01.2014, the Seminar 14021 in Symmetric Cryptography was held in Schloss Dagstuhl – Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this pa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR Transactions on Cryptographic Hardware and Embedded Systems
سال: 2018
ISSN: 2569-2925
DOI: 10.46586/tches.v2018.i3.547-572