Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
Special pages
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

Flash memory `bumping' attacks

From MaRDI portal
Publication:3583449
Jump to:navigation, search

DOI10.1007/978-3-642-15031-9_11zbMATH Open1297.94105OpenAlexW1516014584WikidataQ60163365 ScholiaQ60163365MaRDI QIDQ3583449FDOQ3583449


Authors: Sergei P. Skorobogatov Edit this on Wikidata


Publication date: 17 August 2010

Published in: Cryptographic Hardware and Embedded Systems, CHES 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-15031-9_11




Recommendations

  • scientific article; zbMATH DE number 1979271
  • Attacking an obfuscated cipher by injecting faults
  • A multiple-fault injection attack by adaptive timing control under black-box conditions and a countermeasure
  • Glitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGA
  • Fault Analysis Attack against an AES Prototype Chip Using RSL


zbMATH Keywords

fault injectionoptical probingsemi-invasive attacks


Mathematics Subject Classification ID

Cryptography (94A60)



Cited In (2)

  • Title not available (Why is that?)
  • Characterizing and modeling synchronous clock-glitch fault injection





This page was built for publication: Flash memory `bumping' attacks

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3583449)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:3583449&oldid=16995167"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 5 February 2024, at 03:05. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki