Proceedings 2001 IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems
DOI: 10.1109/dftvs.2001.966796
|View full text |Cite
|
Sign up to set email alerts
|

Fault-based side-channel cryptanalysis tolerant Rijndael symmetric block cipher architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
42
0

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 72 publications
(42 citation statements)
references
References 7 publications
0
42
0
Order By: Relevance
“…For example, if a device that encrypts a symmetric block cipher also includes an implementation (in hardware or software) of the decryption algorithm, then the calculated ciphertext can be decrypted and if the result of this decryption matches the original plaintext, the ciphertext is considered fault-free and safe to output. In [62], the authors described the application of the above technique at different levels of granularity, i.e., checking against the inverse operation at the operation, round or full cipher level. The proposed scheme allows a precise and early identification of the step during which the fault occurred.…”
Section: B Protection Options For Aes and Desmentioning
confidence: 99%
“…For example, if a device that encrypts a symmetric block cipher also includes an implementation (in hardware or software) of the decryption algorithm, then the calculated ciphertext can be decrypted and if the result of this decryption matches the original plaintext, the ciphertext is considered fault-free and safe to output. In [62], the authors described the application of the above technique at different levels of granularity, i.e., checking against the inverse operation at the operation, round or full cipher level. The proposed scheme allows a precise and early identification of the step during which the fault occurred.…”
Section: B Protection Options For Aes and Desmentioning
confidence: 99%
“…2, blocks 2, 3, and 4 of the S-box and the inverse S-box are the same. Therefore, considering [15], the predicted parities of these blocks can be obtained for the inverse S-box.…”
Section: B the S-box And The Inverse S-box Using Normal Basismentioning
confidence: 99%
“…In the schemes proposed in [15] and [22], all the search space of composite fields is considered for presenting optimum lightweight fault detection schemes. The scheme presented in [8] is for all the transformations in the AES encryption/decryption independent of the ways these transformations are implemented.…”
Section: Introductionmentioning
confidence: 99%
“…Concurrent error detection (CED) techniques have been proposed [9][10] not only to protect the encryption and decryption process from random faults, but also from the intentionally injected faults by attackers. In [11], redundancy-based concurrent error detection techniques have been proposed in two approaches: hardware and time redundancy.…”
Section: Concurrent Error Detection Scheme Design For Camelliamentioning
confidence: 99%