2022 32nd International Conference on Field-Programmable Logic and Applications (FPL) 2022
DOI: 10.1109/fpl57034.2022.00066
|View full text |Cite
|
Sign up to set email alerts
|

Breaking an FPGA-Integrated NIST SP 800-193 Compliant TRNG Hard-IP Core with On-Chip Voltage-Based Fault Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 31 publications
0
0
0
Order By: Relevance
“…Yang Yu et al 26 proposed a deep learning model to break a true random number. Further, Dennis et al 27 also proposed breaking a random model and proved that keys generated using random numbers are broken and insecure. Hence, Random numbers are an essential component of cryptographic systems.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Yang Yu et al 26 proposed a deep learning model to break a true random number. Further, Dennis et al 27 also proposed breaking a random model and proved that keys generated using random numbers are broken and insecure. Hence, Random numbers are an essential component of cryptographic systems.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, existing Certificateless Signatures (CLS) schemes often generate public and private keys using random numbers, rendering them vulnerable to identification by eavesdroppers. Yang Yu et al 26 and Dennis et al 27 have demonstrated the insecurity of keys generated using random numbers. To address this vulnerability, this paper employs the BB84 Quantum Cryptography protocol to securely share the partial private key between the Key Generation Center (KGC) and the user.…”
Section: Introductionmentioning
confidence: 99%