搜索结果: 1-15 共查到“Fault”相关记录395条 . 查询时间(0.148 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Quantum Error Correction: Fault-tolerance and Universality
量子纠错 容错性 通用性
2023/4/17
Deep underground forces explain earthquakes along San Andreas Fault(图)
Deep underground forces earthquakes San Andreas Fault
2020/9/18
On the segment of the San Andreas Fault near Parkfield, California, underground excitations -- beyond the depths where quakes are typically monitored -- lead to instability that ruptures in a quake."M...
A Study of Persistent Fault Analysis
Fault Analysis PFA Feistel Networks Reverse Engineering
2019/9/19
Persistent faults mark a new class of injections that perturb lookup tables within block ciphers with the overall goal of recovering the encryption key. Unlike earlier fault types persistent faults re...
Table Redundancy Method for Protecting against Differential Fault Analysis in the White-box Cryptography
Differential fault analysis white-box cryptography countermeasure
2019/8/26
Differential Fault Analysis (DFA) intentionally injects some fault into the encryption process and analyzes a secret key from the mathematical relationship between faulty and fault-free ciphertexts. E...
Security of Hedged Fiat-Shamir Signatures under Fault Attacks
signature schemes fault attacks Fiat-Shamir signatures
2019/8/22
Deterministic generation of per-signature randomness has been a widely accepted solution to mitigate the catastrophic risk of randomness failure in Fiat-Shamir type signature schemes. However, recent ...
Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers
Fault attacks PRESEN
2019/8/19
Fault attacks (FA) are one of the potent practical threats to modern cryptographic implementations. Over the years the FA tech- niques have evolved, gradually moving towards the exploitation of device...
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection
Side-channel Analysis Inner Product Masking Fault Detection
2019/8/14
Side-channel analysis and fault injection attacks are two typical threats to cryptographic implementations, especially in modern embedded devices. Thus there is an insistent demand for dual side-chann...
Another Look at Byzantine Fault Tolerance
cryptographic protocols Byzantine Fault Tolerance
2019/7/26
We review several solutions for the Byzantine Fault Tolerance (BFT) problem and discuss some aspects that are frequently overlooked by existing literatures. For example, PBFT and HotStuff BFT protocol...
A Fast Characterization Method for Optical Fault Injection
Physical attacks Fault injection Fast space characterization
2019/7/26
Semi-invasive fault injection attacks, such as optical fault injection, are powerful techniques well-known by attackers and secure embedded system designers. When performing such attacks, the selectio...
SKIVA: Flexible and Modular Side-channel and Fault Countermeasures
Bitslicing Side-channel attacks Fault attacks
2019/7/8
We describe SKIVA, a customized 32-bit processor enabling the design of software countermeasures for a broad range of implementation attacks covering fault injection and side-channel analysis of timin...
In recent literature, there has been a particular interest in studying nonce based AE schemes in the light of fault based attacks as they seem to present an automatic protection against Differential F...
Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates
Deterministic Lattice Signatures pqm4 Fault Attack
2019/7/8
In this paper, we analyze the implementation level fault vulnerabilities of deterministic lattice-based signature schemes. In particular, we extend the practicality of skip-addition fault attacks thro...
Assuring security of the Internet of Things (IoT) is much more challenging than assuring security of centralized environments, like the cloud. A reason for this is that IoT devices are often deployed ...