Preventing Fault Attacks Using Fault Randomization with a Case Study on AES
From MaRDI portal
Publication:3194611
DOI10.1007/978-3-319-19962-7_20zbMath1368.94098OpenAlexW2230383587MaRDI QIDQ3194611
Shamit Ghosh, Dhiman Saha, Dipanwita Roy Chowdhury, Abhrajit Sengupta
Publication date: 20 October 2015
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-19962-7_20
Related Items
Learn from your faults: leakage assessment in fault attacks using deep learning ⋮ Design of fault-resilient S-boxes for AES-like block ciphers
Cites Work
- Unnamed Item
- Unnamed Item
- Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output
- Checking before output may not be enough against fault-based cryptanalysis
- An Improved Fault Based Attack of the Advanced Encryption Standard
- Analysis of one-dimensional linear hybrid cellular automata over GF(q)
- A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad
- Destroying Fault Invariant with Randomization
- Advanced Encryption Standard – AES