Generalizing statistical ineffective fault attacks in the spirit of side-channel attacks
From MaRDI portal
Publication:2145289
Recommendations
- \textsf{Transform} without \textsf{encode} is not sufficient for SIFA and FTA security: a case study
- Statistical ineffective fault attacks on masked AES with fault countermeasures
- Proving SIFA protection of masked redundant circuits
- Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks
- FIMA: fault intensity map analysis
Cites work
- scientific article; zbMATH DE number 1302812 (Why is no real title available?)
- scientific article; zbMATH DE number 1504807 (Why is no real title available?)
- scientific article; zbMATH DE number 1759669 (Why is no real title available?)
- scientific article; zbMATH DE number 1882023 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A differential fault attack technique against SPN structures, with application to the AES and KHAZAD.
- Combined attack on CRT-RSA. Why public verification must not be public?
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje
- Fault template attacks on block ciphers exploiting fault propagation
- Horizontal Correlation Analysis on Exponentiation
- Information and Communications Security
- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms
- Provably secure higher-order masking of AES
- Statistical ineffective fault attacks on masked AES with fault countermeasures
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order
Cited in
(9)- Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks
- scientific article; zbMATH DE number 7733666 (Why is no real title available?)
- FIMA: fault intensity map analysis
- Learn from your faults: leakage assessment in fault attacks using deep learning
- Public Key Cryptography - PKC 2005
- Statistical properties of side-channel and fault injection attacks using coding theory
- Statistical ineffective fault attacks on masked AES with fault countermeasures
- Practical improvements to statistical ineffective fault attacks
- Proving SIFA protection of masked redundant circuits
This page was built for publication: Generalizing statistical ineffective fault attacks in the spirit of side-channel attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2145289)