2017
DOI: 10.1109/tvlsi.2016.2633412
|View full text |Cite
|
Sign up to set email alerts
|

Fault Diagnosis Schemes for Low-Energy Block Cipher Midori Benchmarked on FPGA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(14 citation statements)
references
References 19 publications
0
14
0
Order By: Relevance
“…These include, but are not limited to, the vulnerability of the protocol to side-channel attacks, such as fault attacks, power analysis attacks, and even combined differential fault analysis and differential power analysis. Specific countermeasures, such as fault detection architectures [ 30 ], error detection schemes [ 31 ], or fault diagnosis schemes [ 32 ], will need to be built in to a security protocol to guard against these attacks. Such a protocol could be implemented either on a field-programmable gate array (FPGA), an application-specific integrated circuit (ASIC), or on an ARM processor, to name a few.…”
Section: Methodsmentioning
confidence: 99%
“…These include, but are not limited to, the vulnerability of the protocol to side-channel attacks, such as fault attacks, power analysis attacks, and even combined differential fault analysis and differential power analysis. Specific countermeasures, such as fault detection architectures [ 30 ], error detection schemes [ 31 ], or fault diagnosis schemes [ 32 ], will need to be built in to a security protocol to guard against these attacks. Such a protocol could be implemented either on a field-programmable gate array (FPGA), an application-specific integrated circuit (ASIC), or on an ARM processor, to name a few.…”
Section: Methodsmentioning
confidence: 99%
“…By identifying potential failures before they occur, predictive maintenance can reduce downtime and improve the overall reliability of AIoT deployments [ 51 , 52 ]. Cryptographic attacks: Various attacks like Masquerading & authentication attack, dictionary attack, Brute Force attack, fault attack, Side chain attacks are studied for checking the network performance of model [ [53] , [54] , [55] ]. …”
Section: Literature Reviewmentioning
confidence: 99%
“…Cryptographic attacks: Various attacks like Masquerading & authentication attack, dictionary attack, Brute Force attack, fault attack, Side chain attacks are studied for checking the network performance of model [ [53] , [54] , [55] ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Some of block cipher algorithms used in the communication applications are Khudra [14], KASUMI [15], LRBC [16], PRESENT [17], SLIM [18], HIGHT [19], Simon [20], KLEIN [21], Midori [22], and CLEFIA [23]. However, the lightweight cipher affects the performance when the system has a huge number of devices during the communication [24].…”
Section: Introductionmentioning
confidence: 99%