Exploring Effects of Electromagnetic Fault Injection on a 32-bit High Speed Embedded Device Microprocessor
暂无分享,去创建一个
[1] Amine Dehbaoui,et al. Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system- , 2012, IACR Cryptol. ePrint Arch..
[2] Alessandro Barenghi,et al. Low Voltage Fault Attacks on the RSA Cryptosystem , 2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).
[3] Jasper G. J. van Woudenberg,et al. Practical Optical Fault Injection on Secure Microcontrollers , 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[4] Assia Tria,et al. Adjusting Laser Injections for Fully Controlled Faults , 2014, COSADE.
[5] Amine Dehbaoui,et al. Electromagnetic Transient Faults Injection on a Hardware and a Software Implementations of AES , 2012, 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[6] Karine Heydemann,et al. Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller , 2013, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[7] Albert Spruyt. Building fault models for microcontrollers , 2012 .
[8] Amine Dehbaoui,et al. Electromagnetic Glitch on the AES Round Counter , 2013, COSADE.
[9] Richard J. Lipton,et al. On the Importance of Eliminating Errors in Cryptographic Computations , 2015, Journal of Cryptology.
[10] Andrew W. Appel,et al. Using memory errors to attack a virtual machine , 2003, 2003 Symposium on Security and Privacy, 2003..
[11] J. Karlsson,et al. Application of Three Physical Fault Injection Techniques to the Experimental Assessment of the MARS Architecture , 1995 .
[12] Map Aarts,et al. Electromagnetic fault injection using transient pulse injections:a comparison of EM-FI and optical-FI on smart cards , 2013 .
[13] Sergei Skorobogatov,et al. Semi-invasive attacks: a new approach to hardware security analysis , 2005 .
[14] Rajesh Velegalati,et al. Electro Magnetic Fault Injection in Practice , 2013 .
[15] Philippe Maurine,et al. Yet Another Fault Injection Technique : by Forward Body Biasing Injection , 2012 .
[16] Jörn-Marc Schmidt,et al. A Practical Fault Attack on Square and Multiply , 2008, 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography.
[17] Ingrid Verbauwhede,et al. The Fault Attack Jungle - A Classification Model to Guide You , 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.