Pub Date : 1900-01-01DOI: 10.1007/978-3-642-29656-7_8
Chong Hee Kim, J. Quisquater
{"title":"Fault Attacks Against RSA-CRT Implementation","authors":"Chong Hee Kim, J. Quisquater","doi":"10.1007/978-3-642-29656-7_8","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_8","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129061884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-642-29656-7_11
K. Akdemir, Zhen Wang, M. Karpovsky, B. Sunar
{"title":"Design of Cryptographic Devices Resilient to Fault Injection Attacks Using Nonlinear Robust Codes","authors":"K. Akdemir, Zhen Wang, M. Karpovsky, B. Sunar","doi":"10.1007/978-3-642-29656-7_11","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_11","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116118377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-642-29656-7_10
A. Hariri, A. Reyhani-Masoleh
{"title":"On Countermeasures Against Fault Attacks on Elliptic Curve Cryptography Using Fault Detection","authors":"A. Hariri, A. Reyhani-Masoleh","doi":"10.1007/978-3-642-29656-7_10","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_10","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123793975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-642-29656-7_16
Alessandro Barenghi, G. Bertoni, L. Breveglieri, M. Pellicioli, Gerardo Pelosi
{"title":"Injection Technologies for Fault Attacks on Microprocessors","authors":"Alessandro Barenghi, G. Bertoni, L. Breveglieri, M. Pellicioli, Gerardo Pelosi","doi":"10.1007/978-3-642-29656-7_16","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_16","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134353138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-642-29656-7_6
K. Bousselam, G. D. Natale, M. Flottes, B. Rouzeyre
{"title":"On Countermeasures Against Fault Attacks on the Advanced Encryption Standard","authors":"K. Bousselam, G. D. Natale, M. Flottes, B. Rouzeyre","doi":"10.1007/978-3-642-29656-7_6","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_6","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124509321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-642-29656-7_7
Alexandre Berzati, Cécile Canovas, L. Goubin
{"title":"A Survey of Differential Fault Analysis Against Classical RSA Implementations","authors":"Alexandre Berzati, Cécile Canovas, L. Goubin","doi":"10.1007/978-3-642-29656-7_7","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_7","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124281773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-642-29656-7_15
F. Regazzoni, L. Breveglieri, P. Ienne, I. Koren
{"title":"Interaction Between Fault Attack Countermeasures and the Resistance Against Power Analysis Attacks","authors":"F. Regazzoni, L. Breveglieri, P. Ienne, I. Koren","doi":"10.1007/978-3-642-29656-7_15","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_15","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131019834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-642-29656-7_12
Phong Q. Nguyen, Mehdi Tibouchi
{"title":"Lattice-Based Fault Attacks on Signatures","authors":"Phong Q. Nguyen, Mehdi Tibouchi","doi":"10.1007/978-3-642-29656-7_12","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_12","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127986231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}