Different security properties are provided by cryptographic architectures to protect sensitive usage models such as implantable and wearable medical devices and nano-sensor nodes. Nevertheless, the way such algorithms are implemented could undermine the needed security and reliability aims. Unless the reliability of architectures is guaranteed, natural or malicious faults can undermine such objectives. Noting this, in this paper, we present error detection approaches for the Camellia block cipher taking into account its linear and non-linear sub-blocks. We also tailor the presented error detection architectures towards the desirability of using different variants of the S-boxes based on the security and reliability objectives. The merit of ...
Achieving secure high-performance implementations for constrained applications such as implantable a...
Fault detection schemes for the Advanced Encryption Standard are aimed at detecting the internal and...
Statistical Ineffective Fault Attacks (SIFA) pose a threat for many practical implementations of sym...
Different security properties are provided by cryptographic architectures to protect sensitive usage...
As we are close to the advent of quantum computing capability, the potential use of resistant algori...
Cryptographic architectures provide different security properties to sensitive usage models. However...
The security and reliability of cryptosystems are endangered with natural occurring and malicious in...
The development of extremely-constrained embedded systems having sensitive nodes such as RFID tags a...
Lightweight block ciphers are essential for providing low-cost confidentiality to sensitive constrai...
Efficient cryptographic architectures are used extensively in sensitive smart infrastructures. Among...
The widespread use of sensitive and constrained applications necessitates lightweight (low-power and...
Achieving secure, high performance implementations for constrained applications such as implantable ...
Achieving secure high-performance implementations for constrained applications such as implantable a...
Fault detection schemes for the Advanced Encryption Standard are aimed at detecting the internal and...
Statistical Ineffective Fault Attacks (SIFA) pose a threat for many practical implementations of sym...
Different security properties are provided by cryptographic architectures to protect sensitive usage...
As we are close to the advent of quantum computing capability, the potential use of resistant algori...
Cryptographic architectures provide different security properties to sensitive usage models. However...
The security and reliability of cryptosystems are endangered with natural occurring and malicious in...
The development of extremely-constrained embedded systems having sensitive nodes such as RFID tags a...
Lightweight block ciphers are essential for providing low-cost confidentiality to sensitive constrai...
Efficient cryptographic architectures are used extensively in sensitive smart infrastructures. Among...
The widespread use of sensitive and constrained applications necessitates lightweight (low-power and...
Achieving secure, high performance implementations for constrained applications such as implantable ...
Achieving secure high-performance implementations for constrained applications such as implantable a...
Fault detection schemes for the Advanced Encryption Standard are aimed at detecting the internal and...
Statistical Ineffective Fault Attacks (SIFA) pose a threat for many practical implementations of sym...