Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Checking before output may not be enough against fault-based cryptanalysis - MaRDI portal

Checking before output may not be enough against fault-based cryptanalysis

From MaRDI portal
Publication:3417029

DOI10.1109/12.869328zbMath1300.94101OpenAlexW2144952508MaRDI QIDQ3417029

Sung-Ming Yen, Marc Joye

Publication date: 9 January 2007

Published in: IEEE Transactions on Computers (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/5be314fb30d315d7e85229c9a4fe6794508bd040




Related Items (22)

A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA)\textsf{Transform} without \textsf{encode} is not sufficient for SIFA and FTA security: a case studySafe-error attacks on SIKE and CSIDHPreventing Fault Attacks Using Fault Randomization with a Case Study on AESScalar recoding and regular \(2^w\)-ary right-to-left EC scalar multiplication algorithmComplete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacksNew fault attacks using Jacobi symbol and application to regular right-to-left algorithmsStatistical Fault Attacks on Nonce-Based Authenticated Encryption SchemesFault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidatesDEFAULT: cipher level resistance against differential fault attackA third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blindingPolar differential power attacks and evaluationFault attacks on nonce-based authenticated encryption: application to Keyak and KetjeMemory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate RepresentationBinary Huff CurvesFault Analysis Study of IDEASecuring RSA against Fault Analysis by Double Addition Chain ExponentiationError detection and error correction procedures for the advanced encryption standardFault template attacks on block ciphers exploiting fault propagationSecurity of hedged Fiat-Shamir signatures under fault attacksExponent Recoding and Regular Exponentiation AlgorithmsSquare Always Exponentiation







This page was built for publication: Checking before output may not be enough against fault-based cryptanalysis