Book ChapterDOI
The Advanced Encryption Standard (AES)
Christof Paar,Jan Pelzl +1 more
- pp 87-121
TLDR
The Advanced Encryption Standard is the most widely used symmetric cipher today and is also mandatory in several industry standards and is used in many commercial systems.Abstract:
The Advanced Encryption Standard (AES) is the most widely used symmetric cipher today. Even though the term “Standard” in its name only refers to US government applications, the AES block cipher is also mandatory in several industry standards and is used in many commercial systems. Among the commercial standards that include AES are the Internet security standard IPsec, TLS, the Wi-Fi encryption standard IEEE 802.11i, the secure shell network protocol SSH (Secure Shell), the Internet phone Skype and numerous security products around the world. To date, there are no attacks better than brute-force known against AES.read more
Citations
More filters
Book ChapterDOI
When clocks fail: on critical paths and clock faults
TL;DR: This work provides a theoretical analysis, backed by practical experiments, explaining when and how clock faults occur, and understanding and modeling the chain of events following a transient clock alteration allows to accurately predict faulty circuit behavior.
Journal ArticleDOI
A Mobile Cloud-Based Parkinson’s Disease Assessment System for Home-Based Monitoring
TL;DR: A prototype mobile cloud-based mHealth app, “PD Dr”, which collects quantitative and objective information about PD and would enable home-based assessment and monitoring of major PD symptoms and demonstrated strong correlation with PD severity stage, hand resting tremor severity, and gait difficulty.
Book ChapterDOI
Cycling attacks on GCM, GHASH and other polynomial MACs and hashes
TL;DR: It is shown that GHASH has much wider classes of weak keys in its 512 multiplicative subgroups, analyze some of their properties, and gives experimental results on AES-GCM weak key search.
FPGA Implementations of the AES Masked Against Power Analysis Attacks
TL;DR: This paper exploits both the increased size of state-of-the-art reconfigurable hardware devices and previous optimization techniques to minimize the memory occupation of software S-boxes, in order to provide an efficient FPGA implementation of the AES algorithm, masked against side-channel attacks.
Book ChapterDOI
Electromagnetic glitch on the AES round counter
TL;DR: A Round Addition Analysis on a software implementation of the Advanced Encryption Standard (aes) algorithm is presented, able to disrupt the round counter increment at the end of the penultimate round and execute one additional round to recover the encryption key with only two pairs of corresponding correct and faulty ciphertexts.