Cryptographic architectures provide different security properties to sensitive usage models. However, unless reliability of architectures is guaranteed, such security properties can be undermined through natural or malicious faults. In this paper, two underlying block ciphers which can be used in authenticated encryption algorithms are considered, i.e., light encryption device and high security and lightweight block ciphers. The former is of the Advanced Encryption Standard type and has been considered area-efficient, while the latter constitutes a Feistel network structure and is suitable for low-complexity and low-power embedded security applications. In this paper, we propose efficient error detection architectures including variants of ...
Different security properties are provided by cryptographic architectures to protect sensitive usage...
Achieving secure, high performance implementations for constrained applications such as implantable ...
Abstract — Fault attacks are powerful and efficient cryptanalysis techniques to find the secret key ...
Cryptographic architectures provide different security properties to sensitive usage models. However...
The development of extremely-constrained embedded systems having sensitive nodes such as RFID tags a...
The widespread use of sensitive and constrained applications necessitates lightweight (low-power and...
The security and reliability of cryptosystems are endangered with natural occurring and malicious in...
As we are close to the advent of quantum computing capability, the potential use of resistant algori...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
The Advanced Encryption Standard, which is used extensively for secure communications, has been acce...
Lightweight block ciphers are essential for providing low-cost confidentiality to sensitive constrai...
Different security properties are provided by cryptographic architectures to protect sensitive usage...
Achieving secure, high performance implementations for constrained applications such as implantable ...
Abstract — Fault attacks are powerful and efficient cryptanalysis techniques to find the secret key ...
Cryptographic architectures provide different security properties to sensitive usage models. However...
The development of extremely-constrained embedded systems having sensitive nodes such as RFID tags a...
The widespread use of sensitive and constrained applications necessitates lightweight (low-power and...
The security and reliability of cryptosystems are endangered with natural occurring and malicious in...
As we are close to the advent of quantum computing capability, the potential use of resistant algori...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
The Advanced Encryption Standard, which is used extensively for secure communications, has been acce...
Lightweight block ciphers are essential for providing low-cost confidentiality to sensitive constrai...
Different security properties are provided by cryptographic architectures to protect sensitive usage...
Achieving secure, high performance implementations for constrained applications such as implantable ...
Abstract — Fault attacks are powerful and efficient cryptanalysis techniques to find the secret key ...