default search action
FDTC 2014: Busan, South Korea
- Assia Tria, Dooho Choi:
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2014, Busan, South Korea, September 23, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-6292-1
Invited Paper
- Johannes Blömer, Peter Günther, Gennadij Liske:
Tampering Attacks in Pairing-Based Cryptography. 1-7
Physical and Design Security of ICs
- Thomas Korak, Michael Hoefler:
On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms. 8-17 - Raghavan Kumar, Philipp Jovanovic, Wayne P. Burleson, Ilia Polian:
Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware. 18-28
Algebraic and Differential Fault Analysis
- Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Jerry Shi, Chujiao Ma, Dawu Gu:
Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering. 29-39 - Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay:
Differential Fault Analysis on the Families of SIMON and SPECK Ciphers. 40-48 - Nahid Farhady Ghalaty, Bilgiday Yuce, Mostafa M. I. Taha, Patrick Schaumont:
Differential Fault Intensity Analysis. 49-58
Fault Models and Countermeasures
- Oliver Mischke, Amir Moradi, Tim Güneysu:
Fault Sensitivity Analysis Meets Zero-Value Attack. 59-67 - Pablo Rauzy, Sylvain Guilley:
Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA. 68-82 - Hélène Le Bouder, Gaël Thomas, Yanis Linge, Assia Tria:
On Fault Injections in Generalized Feistel Networks. 83-93
Simulated and Experimental Attacks
- Roman Korkikian, Sylvain Pelissier, David Naccache:
Blind Fault Attack against SPN Ciphers. 94-103 - Thomas Korak, Michael Hutter, Baris Ege, Lejla Batina:
Clock Glitch Attacks in the Presence of Heating. 104-114 - Ronan Lashermes, Marie Paindavoine, Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin:
Practical Validation of Several Fault Attacks against the Miller Algorithm. 115-122 - Johannes Blömer, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, Jean-Pierre Seifert:
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation. 123-136
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.