Circuit-level information leakage prevention for fault detection
暂无分享,去创建一个
Tatsuya Fujii | Yu-ichi Hayashi | Noriyuki Miura | Kazuo Sakiyama | Takanori Machida | Reina Yagasaki
[1] Christophe Giraud,et al. DFA on AES , 2004, AES Conference.
[2] Yang Li,et al. Fault Sensitivity Analysis , 2010, CHES.
[3] Christophe Giraud,et al. Fault Analysis of Infective AES Computations , 2013, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[4] Michael Tunstall,et al. Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output , 2012, LATINCRYPT.
[5] Michael Hutter,et al. Optical and EM Fault-Attacks on CRT-based RSA : Concrete Results , 2007 .
[6] Christian Plessl,et al. FPGA-accelerated key search for cold-boot attacks against AES , 2013, 2013 International Conference on Field-Programmable Technology (FPT).
[7] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[8] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[9] Markus G. Kuhn,et al. Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.
[10] Mitsugu Iwamoto,et al. Information-Theoretic Approach to Optimal Differential Fault Analysis , 2012, IEEE Transactions on Information Forensics and Security.
[11] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[12] Marc Joye,et al. Strengthening hardware AES implementations against fault attacks , 2007, IET Inf. Secur..
[13] Jean-Max Dutertre,et al. A side-channel and fault-attack resistant AES circuit working on duplicated complemented values , 2011, 2011 IEEE International Solid-State Circuits Conference.
[14] Adrian Thillard,et al. On the Need of Randomness in Fault Attack Countermeasures - Application to AES , 2012, 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[15] Jean-Jacques Quisquater,et al. A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD , 2003, CHES.
[16] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[17] Sylvain Guilley,et al. Practical Setup Time Violation Attacks on AES , 2008, 2008 Seventh European Dependable Computing Conference.