Comprehensive analysis of software countermeasures against fault attacks
暂无分享,去创建一个
[1] Mark G. Karpovsky,et al. Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection , 2006, FDTC.
[2] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[3] Vojin G. Oklobdzija. The Computer Engineering Handbook , 2007 .
[4] Andrew W. Appel,et al. Using memory errors to attack a virtual machine , 2003, 2003 Symposium on Security and Privacy, 2003..
[5] Vojin G. Oklobdzija,et al. The Computer Engineering Handbook: Electrical Engineering Handbook , 2001 .
[6] Janak H. Patel,et al. Concurrent Error Detection in ALU's by Recomputing with Shifted Operands , 1982, IEEE Transactions on Computers.
[7] Alessandro Barenghi,et al. Low Voltage Fault Attacks to AES and RSA on General Purpose Processors , 2010, IACR Cryptol. ePrint Arch..
[8] Massimo Violante,et al. Software-Implemented Hardware Fault Tolerance , 2010 .
[9] Henrique Madeira,et al. Experimental evaluation of the fail-silent behaviour in programs with consistency checks , 1996, Proceedings of Annual Symposium on Fault Tolerant Computing.
[10] Marc Joye,et al. Fault Analysis in Cryptography , 2012, Information Security and Cryptography.
[11] Jean-Jacques Quisquater,et al. How can we overcome both side channel analysis and fault attacks on RSA-CRT? , 2007, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007).
[12] John P. Hayes,et al. Low-cost on-line fault detection using control flow assertions , 2003, 9th IEEE On-Line Testing Symposium, 2003. IOLTS 2003..
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[14] Edward J. McCluskey,et al. Control-flow checking by software signatures , 2002, IEEE Trans. Reliab..
[15] Sergei Skorobogatov,et al. Semi-invasive attacks: a new approach to hardware security analysis , 2005 .
[16] Jean-Pierre Seifert,et al. A new CRT-RSA algorithm secure against bellcore attacks , 2003, CCS '03.
[17] Mark G. Karpovsky,et al. Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard , 2004, International Conference on Dependable Systems and Networks, 2004.
[18] Robert H. Deng,et al. Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults , 1997, Security Protocols Workshop.
[19] Y. Savaria,et al. Software detection mechanisms providing full coverage against single bit-flip faults , 2004, IEEE Transactions on Nuclear Science.
[20] Moti Yung,et al. A Comparative Cost/Security Analysis of Fault Attack Countermeasures , 2006, FDTC.
[21] David I. August,et al. SWIFT: software implemented fault tolerance , 2005, International Symposium on Code Generation and Optimization.
[22] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[23] Martin Otto,et al. Fault attacks and countermeasures , 2005 .