Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers

被引:0
|
作者
Xinjie ZHAO [1 ]
Fan ZHANG [2 ,3 ]
Shize GUO [1 ]
Zheng GONG [4 ]
机构
[1] Institute of North Electronic Equipment
[2] College of Information Science and Electronic Engineering, Zhejiang University
[3] School of Computing, National University of Singapore
[4] School of Computer Science, South China Normal University
基金
中国国家自然科学基金;
关键词
HTH; Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Dear editor,Fault analysis is a very powerful technique used to break cryptographic implementations.In particular,bit-level fault attacks(BLFAs),where one or a few isolated bits are flipped to inject faults,are among the most efficient of the lot.Because it requires both precise fault injection and sophisticated key extraction,a BLFA is very difficult
引用
收藏
页码:246 / 248
页数:3
相关论文
共 21 条
  • [1] Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers
    Zhao, Xinjie
    Zhang, Fan
    Guo, Shize
    Gong, Zheng
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [2] Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers
    Xinjie Zhao
    Fan Zhang
    Shize Guo
    Zheng Gong
    Science China Information Sciences, 2018, 61
  • [3] Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
    Zhang, Fan
    Zhao, Xinjie
    He, Wei
    Bhasin, Shivam
    Guo, Shize
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (04)
  • [4] Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
    Fan ZHANG
    Xinjie ZHAO
    Wei HE
    Shivam BHASIN
    Shize GUO
    Science China(Information Sciences), 2017, 60 (04) : 235 - 237
  • [5] Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers基于分组密码比特翻转故障模型的低开销隐蔽硬件木马设计
    Fan Zhang
    Xinjie Zhao
    Wei He
    Shivam Bhasin
    Shize Guo
    Science China Information Sciences, 2017, 60
  • [6] Efficient bit-level model reductions for automated hardware verification
    Tverdyshev, Sergey
    Alkassar, Eyad
    TIME 2008: 15TH INTERNATIONAL SYMPOSIUM ON TEMPORAL REPRESENTATION AND REASONING, PROCEEDINGS, 2008, : 164 - 172
  • [7] Bit-Balance: Model-Hardware Codesign for Accelerating NNs by Exploiting Bit-Level Sparsity
    Sun, Wenhao
    Zou, Zhiwei
    Liu, Deng
    Sun, Wendi
    Chen, Song
    Kang, Yi
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (01) : 152 - 163
  • [8] Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher
    Chen, Hao
    Wang, Tao
    Zhang, Fan
    Zhao, Xinjie
    He, Wei
    Xu, Lumin
    Ma, Yunfei
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [9] Probabilistic Shaping Using a Block-Based Bit-Level Distribution Matcher
    Goukhshtein, Maxim
    Draper, Stark C.
    Mitra, Jeebak
    2022 17TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2022, : 68 - 73
  • [10] An image encryption scheme based on rotation matrix bit-level permutation and block diffusion
    Zhang, Yushu
    Xiao, Di
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (01) : 74 - 82