Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

Destroying Fault Invariant with Randomization

From MaRDI portal
Publication:5265070
Jump to:navigation, search

DOI10.1007/978-3-662-44709-3_6zbMATH Open1383.94046OpenAlexW2132533351MaRDI QIDQ5265070FDOQ5265070

Debdeep Mukhopadhyay, Harshal Tupsamudre, Shikha Bisht

Publication date: 21 July 2015

Published in: Advanced Information Systems Engineering (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-44709-3_6



zbMATH Keywords

randomnessAESfault attackinfection countermeasure


Mathematics Subject Classification ID

Cryptography (94A60)



Cited In (8)

  • Information-combining differential fault attacks on DEFAULT
  • \textsf{Transform} without \textsf{encode} is not sufficient for SIFA and FTA security: a case study
  • Design of fault-resilient S-boxes for AES-like block ciphers
  • All shall FA-LLL: breaking CT-RSA 2022 and CHES 2022 infective countermeasures with lattice-based fault attacks
  • Fault template attacks on block ciphers exploiting fault propagation
  • Rogue Decryption Failures: Reconciling AE Robustness Notions
  • Preventing Fault Attacks Using Fault Randomization with a Case Study on AES
  • Learn from your faults: leakage assessment in fault attacks using deep learning






This page was built for publication: Destroying Fault Invariant with Randomization

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5265070)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:5265070&oldid=19904932"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 8 February 2024, at 20:24. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki