نتایج جستجو برای: multiple byte fault
تعداد نتایج: 821636 فیلتر نتایج به سال:
In this paper, a lightweight hybrid fault tolerant approach for AES, which is based on the integration of the algorithm based fault tolerant (ABFT) technique and the fault tolerant technique for s-box byte substitution operation is proposed. Two versions of scheme are presented to satisfy different application requirements. The first general version scheme can detect single error for the whole ...
Middleware is a class of software systems above the operating system which is becoming widely used for programming distributed systems. Voting is a fundamental operation when distributed systems involve replicated components. However, support for voting in middleware is very limited. This paper describes issues involved with supporting voting, and more general data fusion, in middleware. We des...
In this paper, we describe versatile and powerful algorithms for searching guess-and-determine and meet-in-the-middle attacks on byte-oriented symmetric primitives. To demonstrate the strengh of these tool, we show that they allows to automatically discover new attacks on round-reduced AES with very low data complexity, and to find improved attacks on the AES-based MACs Alpha-MAC and Pelican-MA...
Differential Fault Analysis (DFA) attack is a powerful cryptanalytic technique that could be used to retrieve the secret key by exploiting computational errors in the encryption (decryption) procedure. In the present paper, we propose a new DFA attack on SMS4 using a single fault. We show that if a random byte fault is induced into either the second, third, or fourth word register at the input ...
A Fault Attack (FA) is performed mainly under the data corruption model and poses a threat to security chips. Instruction can enact same purpose at behavioral level, which produced by interfering with instruction system. Laser Injection (LFI) on program memory during instruction-fetching process, we refer as an attack, studied in this paper. This process bears ability produce controllable fault...
in this study, detection and identification of common faults in industrial gas turbines is investigated. we propose a model-based robust fault detection(fd) method based on multiple models. for residual generation a bank of local linear neuro-fuzzy (llnf) models is used. moreover, in fault detection step, a passive approach based on adaptive threshold is employed. to achieve this purpose, the a...
recently different approaches have been developed in the field of sensor fault diagnostics based on auto-associative neural network (aann). in this paper we present a novel algorithm called self reconstructing auto-associative neural network (s-aann) which is able to detect and isolate single faulty sensor via reconstruction. we have also extended the algorithm to be applicable in multiple faul...
Keccak-based algorithms such as Secure Hash Algorithm-3 (SHA3) will be widely used in crypto systems, and evaluating their security against different kinds of attacks is vitally important. This paper presents an efficient differential fault analysis (DFA) method on all four modes of SHA-3 to recover an entire internal state, which leads to message recovery in the regular hashing mode and key re...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید