Applied Cryptography and Network Security
From MaRDI portal
Publication:5443115
DOI10.1007/b13996zbMath1131.94313OpenAlexW4298286659MaRDI QIDQ5443115
Pierre Dusart, Gilles Letourneux, Olivier Vivolo
Publication date: 19 February 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b13996
Related Items (17)
Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis ⋮ Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults? ⋮ On the structural weakness of the GGHN stream cipher ⋮ Evolutionary ciphers against differential power analysis and differential fault analysis ⋮ Generalized probabilistic satisfiability and applications to modelling attackers with side-channel capabilities ⋮ Fault analysis of the NTRUSign digital signature scheme ⋮ Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round ⋮ Differential Fault Analysis of Sosemanuk ⋮ An Improved Differential Fault Analysis on AES-256 ⋮ White-box cryptography: don't forget about grey-box attacks ⋮ Differential fault analysis of AES: toward reducing number of faults ⋮ Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts ⋮ Error detection and error correction procedures for the advanced encryption standard ⋮ An Improved Fault Based Attack of the Advanced Encryption Standard ⋮ Differential fault attack on Rocca ⋮ Differential fault attack on lightweight block cipher PIPO ⋮ Persistent fault analysis with few encryptions
This page was built for publication: Applied Cryptography and Network Security