Showing 1 - 2 results of 2 for search '"error attacks"', query time: 0.05s Refine Results
  1. 1

    Experimental Implementation of Enhanced Security Coherent One-Way Quantum Key Distribution by Amirhosein Dadahhani, Soheil Hajibaba, Hamid Asgari, Majid Khodabandeh, Fatemeh Rezazadeh, Azam Mani, Seyed Ahmad Madani

    Published 2025-01-01
    “…We also emphasize that monitoring the click rates of the data line detector for each state individually serves as a powerful method for detecting zero-error attacks.…”
    Get full text
    Article
  2. 2

    Differential fault analysis on EMV application cryptogram by Qian PENG, Zeng-ju LI, Ru-hui SHI

    Published 2016-04-01
    “…The process of application cryptogram in EMV was researched and dummy bits in session key were found.Based on the session key’s dummy bits and compressive property of DES’s Sbox,much information of the application cryptogram master key was got by using safe-error attack.The differential fault attack model and steps to implement the attack were proposed,two key factors(the probability of generating wrong key and the probability of collision happening) affecting an attacking result were analyzed.The theoretical result and simulation of the attack were given.The experiment results show that the two keys could be distinguished in a real attacking when the dif-ference of two key’s collision probability was bigger than 0.003 5.The dummy bits in the key will increase the dif-ference and make distinguishing easier.Finally,several countermeasures against the attack were proposed.…”
    Get full text
    Article