Fault template attacks on block ciphers exploiting fault propagation
From MaRDI portal
Publication:2055630
DOI10.1007/978-3-030-45721-1_22zbMath1479.94251OpenAlexW3011642719MaRDI QIDQ2055630
Debdeep Mukhopadhyay, Debapriya Basu Roy, Arnab Bag, Sikhar Patranabis, Sayandeep Saha
Publication date: 1 December 2021
Full work available at URL: http://hdl.handle.net/20.500.11850/392569
Related Items (4)
\textsf{Transform} without \textsf{encode} is not sufficient for SIFA and FTA security: a case study ⋮ Generalizing statistical ineffective fault attacks in the spirit of side-channel attacks ⋮ Learn from your faults: leakage assessment in fault attacks using deep learning ⋮ Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Side-channel resistant crypto for less than 2,300 GE
- Statistical ineffective fault attacks on masked AES with fault countermeasures
- ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
- An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order
- Checking before output may not be enough against fault-based cryptanalysis
- Consolidating Masking Schemes
- PRESENT: An Ultra-Lightweight Block Cipher
- Threshold Implementations Against Side-Channel Attacks and Glitches
- GIFT: A Small Present
- Destroying Fault Invariant with Randomization
- Advances in Cryptology - CRYPTO 2003
This page was built for publication: Fault template attacks on block ciphers exploiting fault propagation