Glitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGA
From MaRDI portal
Publication:656510
DOI10.1007/S00145-010-9083-9zbMATH Open1239.94040OpenAlexW2079792016MaRDI QIDQ656510FDOQ656510
Authors: G. Canivet, P. Maistri, R. Leveugle, J. Clédière, F. Valette, Marc Renaudin
Publication date: 18 January 2012
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-010-9083-9
Recommendations
- scientific article; zbMATH DE number 1941113
- scientific article; zbMATH DE number 1844640
- Exploring the feasibility of low cost fault injection attacks on sub-threshold devices through an example of a 65nm AES implementation
- Buying AES design resistance with speed and energy
- Fault Analysis Attack against an AES Prototype Chip Using RSL
Cites Work
- On the importance of eliminating errors in cryptographic computations
- Title not available (Why is that?)
- Title not available (Why is that?)
- A differential fault attack technique against SPN structures, with application to the AES and KHAZAD.
- Title not available (Why is that?)
- Advanced Encryption Standard – AES
- Title not available (Why is that?)
- Double-Data-Rate Computation as a Countermeasure against Fault Analysis
Cited In (6)
- Title not available (Why is that?)
- Flash memory `bumping' attacks
- Practical improvements to statistical ineffective fault attacks
- Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs
- Learn from your faults: leakage assessment in fault attacks using deep learning
- Exploring the feasibility of low cost fault injection attacks on sub-threshold devices through an example of a 65nm AES implementation
This page was built for publication: Glitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGA
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q656510)