Destroying Fault Invariant with Randomization
From MaRDI portal
Publication:5265070
DOI10.1007/978-3-662-44709-3_6zbMATH Open1383.94046OpenAlexW2132533351MaRDI QIDQ5265070FDOQ5265070
Debdeep Mukhopadhyay, Harshal Tupsamudre, Shikha Bisht
Publication date: 21 July 2015
Published in: Advanced Information Systems Engineering (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-44709-3_6
Cited In (8)
- Information-combining differential fault attacks on DEFAULT
- \textsf{Transform} without \textsf{encode} is not sufficient for SIFA and FTA security: a case study
- Design of fault-resilient S-boxes for AES-like block ciphers
- All shall FA-LLL: breaking CT-RSA 2022 and CHES 2022 infective countermeasures with lattice-based fault attacks
- Fault template attacks on block ciphers exploiting fault propagation
- Rogue Decryption Failures: Reconciling AE Robustness Notions
- Preventing Fault Attacks Using Fault Randomization with a Case Study on AES
- Learn from your faults: leakage assessment in fault attacks using deep learning
This page was built for publication: Destroying Fault Invariant with Randomization
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5265070)