Information-combining differential fault attacks on DEFAULT
From MaRDI portal
Publication:2170087
DOI10.1007/978-3-031-07082-2_7zbMath1497.94108OpenAlexW3207691340MaRDI QIDQ2170087
Maria Eichlseder, Christoph Dobraunig, Marcel Nageler
Publication date: 30 August 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-07082-2_7
Related Items (2)
Learn from your faults: leakage assessment in fault attacks using deep learning ⋮ DEFAULT: cipher level resistance against differential fault attack
Uses Software
Cites Work
- \textsc{Friet}: an authenticated encryption scheme with built-in fault detection
- Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output
- Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
- A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad
- Destroying Fault Invariant with Randomization
- CRAFT
- DEFAULT: cipher level resistance against differential fault attack
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Information-combining differential fault attacks on DEFAULT