Recomputing with Permuted Operands: A Concurrent Error Detection Approach


Naturally occurring and maliciously injected faults reduce the reliability of cryptographic hardware and may leak confidential information. We develop a concurrent error detection technique (CED) called recomputing with permuted operands (REPO). We show that it is cost effective in advanced encryption standard (AES) and a secure hash function Grøstl… (More)
DOI: 10.1109/TCAD.2013.2263037


18 Figures and Tables


Citations per Year

Citation Velocity: 30

Averaging 30 citations per year over the last 3 years.

Learn more about how we calculate this metric in our FAQ.

Slides referencing similar topics