Pub Date : 1900-01-01DOI: 10.1007/978-3-642-29656-7_14
Alessandro Barenghi, E. Trichina
{"title":"Fault Attacks on Stream Ciphers","authors":"Alessandro Barenghi, E. Trichina","doi":"10.1007/978-3-642-29656-7_14","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_14","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123481627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-642-29656-7_1
E. Oswald, François-Xavier Standaert
{"title":"Side-Channel Analysis and Its Relevance to Fault Attacks","authors":"E. Oswald, François-Xavier Standaert","doi":"10.1007/978-3-642-29656-7_1","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_1","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117171381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-642-29656-7_4
Christophe Giraud
{"title":"Differential Fault Analysis of the Advanced Encryption Standard","authors":"Christophe Giraud","doi":"10.1007/978-3-642-29656-7_4","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_4","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125078470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-642-29656-7_13
Nadia El Mrabet, D. Page, F. Vercauteren
{"title":"Fault Attacks on Pairing-Based Cryptography","authors":"Nadia El Mrabet, D. Page, F. Vercauteren","doi":"10.1007/978-3-642-29656-7_13","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_13","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"327 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115966597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-642-29656-7_11
K. Akdemir, Zhen Wang, M. Karpovsky, B. Sunar
{"title":"Design of Cryptographic Devices Resilient to Fault Injection Attacks Using Nonlinear Robust Codes","authors":"K. Akdemir, Zhen Wang, M. Karpovsky, B. Sunar","doi":"10.1007/978-3-642-29656-7_11","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_11","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116118377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-642-29656-7_10
A. Hariri, A. Reyhani-Masoleh
{"title":"On Countermeasures Against Fault Attacks on Elliptic Curve Cryptography Using Fault Detection","authors":"A. Hariri, A. Reyhani-Masoleh","doi":"10.1007/978-3-642-29656-7_10","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_10","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123793975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-642-29656-7_16
Alessandro Barenghi, G. Bertoni, L. Breveglieri, M. Pellicioli, Gerardo Pelosi
{"title":"Injection Technologies for Fault Attacks on Microprocessors","authors":"Alessandro Barenghi, G. Bertoni, L. Breveglieri, M. Pellicioli, Gerardo Pelosi","doi":"10.1007/978-3-642-29656-7_16","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_16","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134353138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-642-29656-7_6
K. Bousselam, G. D. Natale, M. Flottes, B. Rouzeyre
{"title":"On Countermeasures Against Fault Attacks on the Advanced Encryption Standard","authors":"K. Bousselam, G. D. Natale, M. Flottes, B. Rouzeyre","doi":"10.1007/978-3-642-29656-7_6","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_6","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124509321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}