Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fault injection attack
biblio
Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application
Submitted by grigby1 on Mon, 03/29/2021 - 11:02am
microcontrollers
similar MCU-based applications
security risks
security of data
security challenges
secure embedded IoT applications
safety-critical software
safety-critical applications
resilient applications
Resiliency
resilience
pubcrawl
power system security
physical attacks
patient care
composability
Metrics
Internet of Things (IoT)
Internet of Things
hardware security vulnerability assessment
hardware security assessment approach
Hardware Security
fault injection attacks
fault injection attack
Fault Attacks
embedded systems
embedded software developers
Detection and Mitigation
critical medical IoT device
critical embedded application
biblio
An Efficient Fault Detection Method for Elliptic Curve Scalar Multiplication Montgomery Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 11:54am
Fault detection method
smaller keys
Scalability
Resiliency
resilience
public key cryptosystems
public key cryptography
pubcrawl
power consumption
Montgomery Scalar Multiplication algorithm
Montgomery ladder
Metrics
key sizes
Hardware
fault injection attack
fault diagnosis
Circuit faults
fault detection
Fault Attacks
embedded devices
Elliptical Curve Cryptography
Elliptic curves
elliptic curve Scalar Multiplication Montgomery algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
efficient fault detection method
efficient countermeasure
ECC
cryptographic computation
Conferences
classical asymmetric cryptosystems
biblio
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm
Submitted by grigby1 on Mon, 11/27/2017 - 11:06am
finite field
vigilant periodic sequence algorithm
software reliability
software fault tolerance
security perspectives
scalar multiplication algorithm
scalar multiplication
Resiliency
public key cryptography
pubcrawl
physical attacks
Metrics
Algorithm design and analysis
fault injection attack
Fault Attacks
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECDSA
digital signatures
composability
Circuit faults
biblio
Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography
Submitted by grigby1 on Mon, 11/27/2017 - 11:06am
pragmatic hazard
side channel attack
Security analysis
scalar multiplication
RNS
Resistance
Resiliency
residue number systems
residue number system
public key cryptography
pubcrawl
Algorithm design and analysis
power analysis
PA-FA countermeasure
Metrics
Manganese
fault injection attack
fault detection
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
Electronic mail
composability
biblio
"Fault Detection and Correction in Processing AES Encryption Algorithm"
Submitted by grigby1 on Mon, 02/13/2017 - 12:52pm
production faults
fault diagnosis
fault injection attack
fault-tolerance technique design
field programmable gate arrays
FPGA technology
Hardware
linear mappings
MC transformation
MixColumn transformation
noise effects
fault detection technique
pubcrawl170102
radiation effect
ShiftRow transformation
side-channel attacks
Single event upsets
SR transformation
system reliability improvement
system security improvement
temporary redundant check words
encryption
AES cipher
AES encryption algorithm
AES Encryption process
AES linear mappings and error correcting codes
AES round structure
Ciphers
Cryptography
cryptosystem
ECC properties
advanced encryption standard
error control mechanisms
error correction
error detection
error syndrome
Execution errors and countermeasure against fault injection side channel attacks
fault correction technique
fault coverage
fault detection
Fault detection and correction