Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output
From MaRDI portal
Publication:2915130
DOI10.1007/978-3-642-33481-8_17zbMath1304.94062OpenAlexW2112571059MaRDI QIDQ2915130
Benedikt Gierlichs, Jörn-Marc Schmidt, Michael Tunstall
Publication date: 21 September 2012
Published in: Progress in Cryptology – LATINCRYPT 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-33481-8_17
Related Items (6)
Safe-error attacks on SIKE and CSIDH ⋮ Preventing Fault Attacks Using Fault Randomization with a Case Study on AES ⋮ Information-combining differential fault attacks on DEFAULT ⋮ All shall FA-LLL: breaking CT-RSA 2022 and CHES 2022 infective countermeasures with lattice-based fault attacks ⋮ Learn from your faults: leakage assessment in fault attacks using deep learning ⋮ ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
This page was built for publication: Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output