نتایج جستجو برای: multiple byte fault

تعداد نتایج: 821636  

Journal: :I. J. Network Security 2013
Chang Nian Zhang Qian Yu Xiao Wei Liu

In this paper, a lightweight hybrid fault tolerant approach for AES, which is based on the integration of the algorithm based fault tolerant (ABFT) technique and the fault tolerant technique for s-box byte substitution operation is proposed. Two versions of scheme are presented to satisfy different application requirements. The first general version scheme can detect single error for the whole ...

2001
David E. Bakken Zhiyuan Zhan Christopher C. Jones David A. Karr

Middleware is a class of software systems above the operating system which is becoming widely used for programming distributed systems. Voting is a fundamental operation when distributed systems involve replicated components. However, support for voting in middleware is very limited. This paper describes issues involved with supporting voting, and more general data fusion, in middleware. We des...

Journal: :IACR Cryptology ePrint Archive 2011
Charles Bouillaguet Patrick Derbez Pierre-Alain Fouque

In this paper, we describe versatile and powerful algorithms for searching guess-and-determine and meet-in-the-middle attacks on byte-oriented symmetric primitives. To demonstrate the strengh of these tool, we show that they allows to automatically discover new attacks on round-reduced AES with very low data complexity, and to find improved attacks on the AES-based MACs Alpha-MAC and Pelican-MA...

Journal: :Inf. Process. Lett. 2010
Ruilin Li Bing Sun Chao Li Jianxiong You

Differential Fault Analysis (DFA) attack is a powerful cryptanalytic technique that could be used to retrieve the secret key by exploiting computational errors in the encryption (decryption) procedure. In the present paper, we propose a new DFA attack on SMS4 using a single fault. We show that if a random byte fault is induced into either the second, third, or fourth word register at the input ...

Journal: :Symmetry 2022

A Fault Attack (FA) is performed mainly under the data corruption model and poses a threat to security chips. Instruction can enact same purpose at behavioral level, which produced by interfering with instruction system. Laser Injection (LFI) on program memory during instruction-fetching process, we refer as an attack, studied in this paper. This process bears ability produce controllable fault...

Journal: :journal of computer and robotics 0
leila shahmohamadi department of electrical engineering, islamic azad university, south tehran branch tehran, iran mahdi aliyarishoorehdeli faculty of electrical engineering, k. n. toosi university of technology tehran, iran sharareh talaie department of electrical engineering, islamic azad university, south tehran branch tehran, iran

in this study, detection and identification of common faults in industrial gas turbines is investigated. we propose a model-based robust fault detection(fd) method based on multiple models. for residual generation a bank of local linear neuro-fuzzy (llnf) models is used. moreover, in fault detection step, a passive approach based on adaptive threshold is employed. to achieve this purpose, the a...

Journal: :iranian journal of oil and gas science and technology 0
hamidreza mousavi m.s. student, department of instrumentation & automation engineering, petroleum university of technology, ahwaz, iran. mehdi shahbazian petroleum university of technology nosrat moradi iranian offshore oil company

recently different approaches have been developed in the field of sensor fault diagnostics based on auto-associative neural network (aann). in this paper we present a novel algorithm called self reconstructing auto-associative neural network (s-aann) which is able to detect and isolate single faulty sensor via reconstruction. we have also extended the algorithm to be applicable in multiple faul...

Journal: :IACR Cryptology ePrint Archive 2017
Pei Luo Yunsi Fei Liwei Zhang A. Adam Ding

Keccak-based algorithms such as Secure Hash Algorithm-3 (SHA3) will be widely used in crypto systems, and evaluating their security against different kinds of attacks is vitally important. This paper presents an efficient differential fault analysis (DFA) method on all four modes of SHA-3 to recover an entire internal state, which leads to message recovery in the regular hashing mode and key re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید