Checking before output may not be enough against fault-based cryptanalysis

From MaRDI portal
Revision as of 19:10, 4 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3417029


DOI10.1109/12.869328zbMath1300.94101OpenAlexW2144952508MaRDI QIDQ3417029

Sung-Ming Yen, Marc Joye

Publication date: 9 January 2007

Published in: IEEE Transactions on Computers (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/5be314fb30d315d7e85229c9a4fe6794508bd040



Related Items

A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA), \textsf{Transform} without \textsf{encode} is not sufficient for SIFA and FTA security: a case study, Safe-error attacks on SIKE and CSIDH, Preventing Fault Attacks Using Fault Randomization with a Case Study on AES, Scalar recoding and regular \(2^w\)-ary right-to-left EC scalar multiplication algorithm, Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks, New fault attacks using Jacobi symbol and application to regular right-to-left algorithms, Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes, Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates, DEFAULT: cipher level resistance against differential fault attack, A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding, Polar differential power attacks and evaluation, Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje, Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation, Binary Huff Curves, Fault Analysis Study of IDEA, Securing RSA against Fault Analysis by Double Addition Chain Exponentiation, Error detection and error correction procedures for the advanced encryption standard, Fault template attacks on block ciphers exploiting fault propagation, Security of hedged Fiat-Shamir signatures under fault attacks, Exponent Recoding and Regular Exponentiation Algorithms, Square Always Exponentiation