Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs.
Shivam BhasinJean-Luc DangerSylvain GuilleyNidhal SelmanePublished in: HOST (2009)
Keyphrases
- cryptographic algorithms
- advanced encryption standard
- security threats
- security problems
- security mechanisms
- security protocols
- security measures
- security vulnerabilities
- denial of service attacks
- block cipher
- computer security
- cyber attacks
- security breaches
- security issues
- network security
- security systems
- java card
- security requirements
- efficient implementation
- encryption algorithms
- security policies
- malicious attacks
- stream cipher
- intrusion detection
- privacy preserving
- attack scenarios
- encryption decryption
- intrusion detection system
- elliptic curve cryptography
- information leakage
- sensitive data
- cryptographic protocols