Proceedings International Test Conference 2000 (IEEE Cat. No.00CH37159)
DOI: 10.1109/test.2000.894310
|View full text |Cite
|
Sign up to set email alerts
|

Concurrent error detection in block ciphers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Area overhead of this approach is due to the encoders at the input and decoders at the output to translate the plain and cipher texts into the internal code words. In [16] the plaintext is encoded by setting several bits of the message to a particular fixed value, 0 or 1, and then encrypted. A mismatch between these fixed bits of deciphered text and the original plain text detects an error.…”
Section: Ced Architectures For Symmetric Block Ciphers: Backgroundmentioning
confidence: 99%
“…Area overhead of this approach is due to the encoders at the input and decoders at the output to translate the plain and cipher texts into the internal code words. In [16] the plaintext is encoded by setting several bits of the message to a particular fixed value, 0 or 1, and then encrypted. A mismatch between these fixed bits of deciphered text and the original plain text detects an error.…”
Section: Ced Architectures For Symmetric Block Ciphers: Backgroundmentioning
confidence: 99%
“…Area overhead of this approach is due to the encoders at the input and decoders at the output to translate the plain and cipher texts into the internal code words. A simple encoding scheme of setting several bits of the message to a particular fixed value, 0 or 1, was proposed in [20]. A mismatch between these fixed bits of deciphered text and the original plain text detects an error.…”
Section: Fault-based Side-channel Cryptanalysismentioning
confidence: 99%
“…Another CED approach involves encoding the message before encryption and checking it for errors after decryption [16]. This scheme results in significantly less area overhead as compared to other encoding schemes but has large fault detection latency and needs modification of the algorithm to improve its performance.…”
Section: Fault-based Side-channel Cryptanalysismentioning
confidence: 99%