scispace - formally typeset
Book ChapterDOI

The Advanced Encryption Standard (AES)

TLDR
The Advanced Encryption Standard is the most widely used symmetric cipher today and is also mandatory in several industry standards and is used in many commercial systems.
Abstract
The Advanced Encryption Standard (AES) is the most widely used symmetric cipher today. Even though the term “Standard” in its name only refers to US government applications, the AES block cipher is also mandatory in several industry standards and is used in many commercial systems. Among the commercial standards that include AES are the Internet security standard IPsec, TLS, the Wi-Fi encryption standard IEEE 802.11i, the secure shell network protocol SSH (Secure Shell), the Internet phone Skype and numerous security products around the world. To date, there are no attacks better than brute-force known against AES.

read more

Citations
More filters
Book ChapterDOI

When clocks fail: on critical paths and clock faults

TL;DR: This work provides a theoretical analysis, backed by practical experiments, explaining when and how clock faults occur, and understanding and modeling the chain of events following a transient clock alteration allows to accurately predict faulty circuit behavior.
Journal ArticleDOI

A Mobile Cloud-Based Parkinson’s Disease Assessment System for Home-Based Monitoring

TL;DR: A prototype mobile cloud-based mHealth app, “PD Dr”, which collects quantitative and objective information about PD and would enable home-based assessment and monitoring of major PD symptoms and demonstrated strong correlation with PD severity stage, hand resting tremor severity, and gait difficulty.
Book ChapterDOI

Cycling attacks on GCM, GHASH and other polynomial MACs and hashes

TL;DR: It is shown that GHASH has much wider classes of weak keys in its 512 multiplicative subgroups, analyze some of their properties, and gives experimental results on AES-GCM weak key search.

FPGA Implementations of the AES Masked Against Power Analysis Attacks

TL;DR: This paper exploits both the increased size of state-of-the-art reconfigurable hardware devices and previous optimization techniques to minimize the memory occupation of software S-boxes, in order to provide an efficient FPGA implementation of the AES algorithm, masked against side-channel attacks.
Book ChapterDOI

Electromagnetic glitch on the AES round counter

TL;DR: A Round Addition Analysis on a software implementation of the Advanced Encryption Standard (aes) algorithm is presented, able to disrupt the round counter increment at the end of the penultimate round and execute one additional round to recover the encryption key with only two pairs of corresponding correct and faulty ciphertexts.
Related Papers (5)