Preventing Fault Attacks Using Fault Randomization with a Case Study on AES (Q3194611): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364574 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advanced Encryption Standard – AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Improved Fault Based Attack of the Advanced Encryption Standard / rank
 
Normal rank
Property / cites work
 
Property / cites work: Checking before output may not be enough against fault-based cryptanalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output / rank
 
Normal rank
Property / cites work
 
Property / cites work: Destroying Fault Invariant with Randomization / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analysis of one-dimensional linear hybrid cellular automata over GF(q) / rank
 
Normal rank

Latest revision as of 23:11, 10 July 2024

scientific article
Language Label Description Also known as
English
Preventing Fault Attacks Using Fault Randomization with a Case Study on AES
scientific article

    Statements

    Preventing Fault Attacks Using Fault Randomization with a Case Study on AES (English)
    0 references
    0 references
    0 references
    0 references
    20 October 2015
    0 references
    0 references
    infective countermeasure
    0 references
    AES
    0 references
    differential fault attack
    0 references
    fault attack countermeasure
    0 references
    randomized mixing
    0 references
    0 references