Mostrar el registro sencillo del ítem

Ponencia

dc.creatorPotestad Ordóñez, Francisco Eugenioes
dc.creatorJiménez Fernández, Carlos Jesúses
dc.creatorValencia Barrero, Manueles
dc.date.accessioned2021-03-10T06:53:25Z
dc.date.available2021-03-10T06:53:25Z
dc.date.issued2016
dc.identifier.citationPotestad Ordóñez, F.E., Jiménez Fernández, C.J. y Valencia Barrero, M. (2016). Experimental and Timing Analysis Comparison of FPGA Trivium Implementations and their Vulnerability to Clock Fault Injection. En DCIS 2016: Conference on Design of Circuits and Integrated Systems Granada, España: IEEE Computer Society.
dc.identifier.isbn978-1-5090-4565-5es
dc.identifier.urihttps://hdl.handle.net/11441/105826
dc.description.abstractThe security of cryptocircuits is today threatened not only by attacks on algorithms but also, and above all, by attacks on the circuit implementations themselves. These are known as side channel attacks. One variety is the Active Fault Analysis attack, that can make a circuit vulnerable by changing its behavior in a certain way. This article presents an experimental fault insertion attack on an FPGA implementation of the Trivium stream cipher. It also compares the faults introduced with the faults expected after a timing analysis. The results show that this implementation is vulnerable to such attacks, and also that it is not possible to estimate the position of the inserted faults by means of timing analysis.es
dc.description.sponsorshipMinisterio de Economía y Competitividad TEC2010-16870es
dc.description.sponsorshipMinisterio de Economía y Competitividad TEC2013-45523-Res
dc.description.sponsorshipMinisterio de Economía y Competitividad CSIC 201550E039es
dc.formatapplication/pdfes
dc.format.extent6es
dc.language.isoenges
dc.publisherIEEE Computer Societyes
dc.relation.ispartofDCIS 2016: Conference on Design of Circuits and Integrated Systems (2016).
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectFault Attackes
dc.subjectStream Cipheres
dc.subjectTriviumes
dc.subjectFPGA implementationes
dc.titleExperimental and Timing Analysis Comparison of FPGA Trivium Implementations and their Vulnerability to Clock Fault Injectiones
dc.typeinfo:eu-repo/semantics/conferenceObjectes
dcterms.identifierhttps://ror.org/03yxnpp24
dc.type.versioninfo:eu-repo/semantics/submittedVersiones
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses
dc.contributor.affiliationUniversidad de Sevilla. Departamento de Tecnología Electrónicaes
dc.relation.projectIDTEC2010-16870es
dc.relation.projectIDTEC2013-45523-Res
dc.relation.projectIDCSIC 201550E039es
dc.relation.publisherversionhttps://ieeexplore.ieee.org/document/7845270es
dc.identifier.doi10.1109/DCIS.2016.7845270es
dc.eventtitleDCIS 2016: Conference on Design of Circuits and Integrated Systemses
dc.eventinstitutionGranada, Españaes
dc.relation.publicationplaceNew York, USAes
dc.contributor.funderMinisterio de Economía y Competitividad (MINECO). Españaes

FicherosTamañoFormatoVerDescripción
Experimental and timing analysis ...3.236MbIcon   [PDF] Ver/Abrir  

Este registro aparece en las siguientes colecciones

Mostrar el registro sencillo del ítem

Attribution-NonCommercial-NoDerivatives 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como: Attribution-NonCommercial-NoDerivatives 4.0 Internacional