Preventing Fault Attacks Using Fault Randomization with a Case Study on AES (Q3194611): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-319-19962-7_20 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2230383587 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364574 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advanced Encryption Standard – AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Improved Fault Based Attack of the Advanced Encryption Standard / rank
 
Normal rank
Property / cites work
 
Property / cites work: Checking before output may not be enough against fault-based cryptanalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output / rank
 
Normal rank
Property / cites work
 
Property / cites work: Destroying Fault Invariant with Randomization / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analysis of one-dimensional linear hybrid cellular automata over GF(q) / rank
 
Normal rank

Latest revision as of 23:11, 10 July 2024

scientific article
Language Label Description Also known as
English
Preventing Fault Attacks Using Fault Randomization with a Case Study on AES
scientific article

    Statements

    Preventing Fault Attacks Using Fault Randomization with a Case Study on AES (English)
    0 references
    0 references
    0 references
    0 references
    20 October 2015
    0 references
    0 references
    infective countermeasure
    0 references
    AES
    0 references
    differential fault attack
    0 references
    fault attack countermeasure
    0 references
    randomized mixing
    0 references
    0 references