Sciweavers

BIRTHDAY
2012
Springer
12 years 1 days ago
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do no...
Alexandre Berzati, Cécile Canovas-Dumas, Lo...
IACR
2011
128views more  IACR 2011»
12 years 4 months ago
Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PR
—This paper proposes a novel fault-propagation pattern based differential fault analysis method - FPP-DFA, and proves its feasibility on SPN structure block ciphers using bitwise...
Xin-jie Zhao, Tao Wang, Shi-ze Guo
CHES
2011
Springer
271views Cryptology» more  CHES 2011»
12 years 4 months ago
Modulus Fault Attacks against RSA-CRT Signatures
RSA-CRT fault attacks have been an active research area since their discovery by Boneh, DeMillo and Lipton in 1997. We present alternative key-recovery attacks on RSA-CRT signature...
Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi...
JUCS
2008
168views more  JUCS 2008»
13 years 4 months ago
Online Network-on-Chip Switch Fault Detection and Diagnosis Using Functional Switch Faults
: This paper presents efficient methods for online fault detection and diagnosis of Network-on-Chip (NoC) switches. The fault model considered in this research is a system level fa...
Naghmeh Karimi, Armin Alaghi, Mahshid Sedghi, Zain...
JCSS
2008
90views more  JCSS 2008»
13 years 4 months ago
Fault tolerance in cellular automata at high fault rates
A commonly used model for fault-tolerant computation is that of cellular automata. The essential difficulty of fault-tolerant computation is present in the special case of simply ...
Mark McCann, Nicholas Pippenger
EDCC
2008
Springer
13 years 6 months ago
Software Faults Diagnosis in Complex OTS Based Safety Critical Systems
This work addresses the problem of software fault diagnosis in complex safety critical software systems. The transient manifestations of software faults represent a challenging is...
Gabriella Carrozza, Domenico Cotroneo, Stefano Rus...
CTRSA
2008
Springer
160views Cryptology» more  CTRSA 2008»
13 years 6 months ago
Fault Analysis Study of IDEA
We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher's specific property to employ ...
Christophe Clavier, Benedikt Gierlichs, Ingrid Ver...
ATS
2004
IEEE
116views Hardware» more  ATS 2004»
13 years 8 months ago
Testing for Missing-Gate Faults in Reversible Circuits
Logical reversibility occurs in low-power applications and is an essential feature of quantum circuits. Of special interest are reversible circuits constructed from a class of rev...
John P. Hayes, Ilia Polian, Bernd Becker
DDECS
2009
IEEE
149views Hardware» more  DDECS 2009»
13 years 8 months ago
Physical design oriented DRAM Neighborhood Pattern Sensitive Fault testing
Although the Neighborhood Pattern Sensitive Fault (NPSF) model is recognized as a high quality fault model for memory arrays, the excessive test application time cost associated wi...
Yiorgos Sfikas, Yiorgos Tsiatouhas
STOC
1997
ACM
126views Algorithms» more  STOC 1997»
13 years 8 months ago
Page Replacement with Multi-Size Pages and Applications to Web Caching
We consider the paging problem where the pages have varying size. This problem has applications to page replacement policies for caches containing World Wide Web documents. We con...
Sandy Irani