Fault analysis study of IDEA

C Clavier, B Gierlichs, I Verbauwhede - Cryptographers' Track at the RSA …, 2008 - Springer
analysis, we focus on fault analysis. We observe that Collision Fault Analysis (CFA) [7], which
requires a restrictive fault … that Ineffective Fault Analysis (IFA) [5,6], requiring the same fault

Fault analysis study of the block cipher FOX64

R Li, J You, B Sun, C Li - Multimedia Tools and Applications, 2013 - Springer
… And by studying the properties of mixing operations \((\oplus,\boxplus,\odot)\) on different
groups, a fault attack on the nice block cipher IDEA was carefully analyzed in [15]. …

A countermeasure against statistical ineffective fault analysis

J Breier, M Khairallah, X Hou… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
idea is to prevent the attacker from knowing whether the fault … As a case study, we calculated
the costs for protected imple… We study a fault model where each codeword has at most 1 …

A study of persistent fault analysis

A Caforio, S Banik - … , Privacy, and Applied Cryptography Engineering: 9th …, 2019 - Springer
faults as they remain intact over multiple encryptions but vanish once the device is rebooted.
Persistent fault analysis … The idea is based on the fact that in most SPN ciphers, like AES, a …

Fault analysis-based logic encryption

J Rajendran, H Zhang, C Zhang… - IEEE Transactions …, 2013 - ieeexplore.ieee.org
… The proposed fault analysis approach enables a designer to have control over the … The
proposed fault-analysis approach provides the control needed even in these situations, …

Fault analysis of inverter-interfaced distributed generators with different control schemes

Z Shuai, C Shen, X Yin, X Liu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
… A feasible idea to study fault … then fault analysis of IIDGs can be simplified into mathematical
descriptions on the interaction between two voltage sources. Based on this idea, inrush fault

Differential fault analysis on DES middle rounds

M Rivain - … Workshop on Cryptographic Hardware and Embedded …, 2009 - Springer
… ,7,25,17] as well as on other block ciphers such as IDEA [10] and CLEFIA [8,24]. These different …
For a simple DES, based on our study, we recommend to protect the whole cipher. For a …

Feasibility of fault analysis based on intentional electromagnetic interference

J Takahashi, Y Hayashi, N Homma… - 2012 IEEE …, 2012 - ieeexplore.ieee.org
… this studyfault analysis, we need to generate faults into the instruction part that controls
the number of rounds during the cryptographic calculation. As described in Section III, the faults

Fault tree analysis improvements: A bibliometric analysis and literature review

M Yazdi, J Mohammadpour, H Li… - Quality and …, 2023 - Wiley Online Library
… in this study to conduct the bibliometric analysis for detecting, … numbers and their applications
in system fault analysis” 87 94 … The main idea behind this cluster work is to focus on pure …

Idea: embedded fault injection simulator on smartcard

M Berthier, J Bringer, H Chabanne, TH Le… - … Secure Software and …, 2014 - Springer
… Finally, to validate this approach, we study the functional and side-channel impact of fault
For this study, we targeted a software implementation of the DES algorithm. First, a fault-free …