Transient IEMI Threats for Cryptographic Devices
暂无分享,去创建一个
Y. Hayashi | T. Mizuki | H. Sone | N. Homma | T. Aoki
[1] Junko Takahashi,et al. DFA Mechanism on the AES Key Schedule , 2007 .
[2] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[3] Jean-Jacques Quisquater,et al. Faults, Injection Methods, and Fault Attacks , 2007, IEEE Design & Test of Computers.
[4] Jean-Jacques Quisquater,et al. New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough , 2008, CARDIS.
[5] Christophe Giraud,et al. A Survey on Fault Attacks , 2004, CARDIS.
[6] Christophe Giraud,et al. DFA on AES , 2004, AES Conference.
[7] Sylvain Guilley,et al. Silicon-level Solutions to Counteract Passive and Active Attacks , 2008, 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography.
[8] Michael Hutter,et al. RFID and Its Vulnerability to Faults , 2008, CHES.
[9] Frank Leferink. Signal to noise transformation, the key to EMC , 1994, Proceedings of IEEE Symposium on Electromagnetic Compatibility.
[10] Jean-Jacques Quisquater,et al. A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD , 2003, CHES.
[11] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[12] C. Paul. Introduction to electromagnetic compatibility , 2005 .
[13] T. Mizuki,et al. Non-invasive EMI-based fault injection attack against cryptographic modules , 2011, 2011 IEEE International Symposium on Electromagnetic Compatibility.
[14] David Naccache,et al. The Sorcerer's Apprentice Guide to Fault Attacks , 2006, Proceedings of the IEEE.
[15] David Naccache,et al. Single-bit DFA using multiple-byte laser fault injection , 2010, 2010 IEEE International Conference on Technologies for Homeland Security (HST).
[16] Markus G. Kuhn,et al. Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.
[17] A. Satoh,et al. An on-chip glitchy-clock generator and its application to safe-error attack , 2011 .
[18] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[19] Junko Takahashi,et al. Practical Fault Attack on a Cryptographic LSI with ISO/IEC 18033-3 Block Ciphers , 2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).
[20] Sylvain Guilley,et al. WDDL is Protected against Setup Time Violation Attacks , 2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).
[21] Jean-Pierre Seifert,et al. Fault Based Cryptanalysis of the Advanced Encryption Standard (AES) , 2003, Financial Cryptography.
[22] Sung-Ming Yen,et al. Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures , 2003, ACISP.
[23] W.A. Radasky,et al. Introduction to the special issue on high-power electromagnetics (HPEM) and intentional electromagnetic interference (IEMI) , 2004, IEEE Transactions on Electromagnetic Compatibility.
[24] Pierre Dusart,et al. Differential Fault Analysis on A.E.S , 2003, ACNS.