Abstract. Hardware implementations of cryptographic algorithms are vulnerable to fault analysis attacks. To detect these attacks we propose an architecture based on robust nonlinear systematic (n,k)-error-detecting codes. These nonlinear codes offer advantages over linear codes since they are capable of providing uniform error detecting coverage independently of the error distributions. They make no assumptions about what faults or errors will be injected by an attacker. Architectures based on these codes have fewer undetectable errors than linear codes with the same (n,k). We also present several optimization approaches which provide for a tradeoff between the levels of robustness and required overhead for hardware implementations.
Abstract—Modern security-aware embedded systems need pro-tection against fault attacks. These attack...
We present a scheme for robust multi-precision arithmetic over the positive integers, protected by a...
Abstract—In the relatively young field of fault-tolerant cryptography, the main research effort has ...
Hardware implementations of cryptographic algorithms are vulnerable to fault analysis attacks. Metho...
Abstract—Public-key cryptographic devices are vulnerable to fault-injection attacks. As countermeasu...
Abstract. We propose an efficient technique for the detection of errors in cryp-tographic circuits i...
Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fa...
This master thesis aims at securing cryptographic devices against two common types of attacks: side-...
Recent research has shown that fault diagnosis and possibly fault tolerance are important features w...
As we are close to the advent of quantum computing capability, the potential use of resistant algori...
Hardware designers invest a significant design effort when implementing computationally intensive cr...
We will say that code C detects error e with probability 1 Q(e), if Q(e) is a fraction of codewor...
Classical linear error-detecting codes are not optimum for error detection in communication and comp...
International audienceOne of the most effective ways of attacking a cryptographic device is by delib...
National audienceSecure hardware implementations are often used to accelerate cryptographic implemen...
Abstract—Modern security-aware embedded systems need pro-tection against fault attacks. These attack...
We present a scheme for robust multi-precision arithmetic over the positive integers, protected by a...
Abstract—In the relatively young field of fault-tolerant cryptography, the main research effort has ...
Hardware implementations of cryptographic algorithms are vulnerable to fault analysis attacks. Metho...
Abstract—Public-key cryptographic devices are vulnerable to fault-injection attacks. As countermeasu...
Abstract. We propose an efficient technique for the detection of errors in cryp-tographic circuits i...
Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fa...
This master thesis aims at securing cryptographic devices against two common types of attacks: side-...
Recent research has shown that fault diagnosis and possibly fault tolerance are important features w...
As we are close to the advent of quantum computing capability, the potential use of resistant algori...
Hardware designers invest a significant design effort when implementing computationally intensive cr...
We will say that code C detects error e with probability 1 Q(e), if Q(e) is a fraction of codewor...
Classical linear error-detecting codes are not optimum for error detection in communication and comp...
International audienceOne of the most effective ways of attacking a cryptographic device is by delib...
National audienceSecure hardware implementations are often used to accelerate cryptographic implemen...
Abstract—Modern security-aware embedded systems need pro-tection against fault attacks. These attack...
We present a scheme for robust multi-precision arithmetic over the positive integers, protected by a...
Abstract—In the relatively young field of fault-tolerant cryptography, the main research effort has ...