


default search action
FDTC 2015: Saint Malo, France
- Naofumi Homma, Victor Lomné:
2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2015, Saint Malo, France, September 13, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7579-5
Invited Papers
- Stefan Mangard:
Fault Attacks at the System Level - The Challenge of Securing Application Software. 1 - Mathias Wagner:
The Need for Intrinsic Hardware Security Below 65nm. 2
Session 1: Fault Injection: Models and Techniques
- Sébastien Ordas, Ludovic Guillaume-Sage, Philippe Maurine:
EM Injection: Fault Model and Locality. 3-13 - Falk Schellenberg
, Markus Finkeldey, Bastian Richter, Maximilian Schapers, Nils Gerhardt
, Martin Hofmann
, Christof Paar:
On the Complexity Reduction of Laser Fault Injection Campaigns Using OBIC Measurements. 14-27
Session 2: DFA: Models and Techniques
- Yuming Huo, Fan Zhang, Xiutao Feng, Li-Ping Wang:
Improved Differential Fault Attack on the Block Cipher SPECK. 28-34 - Luca Magri
, Silvia Mella
, Pasqualina Fragneto, Filippo Melzani
, Beatrice Rossi:
J-DFA: A Novel Approach for Robust Differential Fault Analysis. 35-44 - Alberto Battistello, Christophe Giraud
:
Lost in Translation: Fault Analysis of Infective Security Proofs. 45-53
Session 3: Fault Injection Attacks to Cipher Families
- Guillaume Bethouart, Nicolas Debande:
To Exploit Fault Injection on Non-injective Sboxes. 54-60 - Juan del Carmen Grados Vasquez, Fábio Borges
, Renato Portugal, Pedro C. S. Lara:
An Efficient One-Bit Model for Differential Fault Analysis on Simon Family. 61-70
Session 4: Fault Attacks to Cryptographic Devices
- Johannes Blömer, Peter Günther:
Singular Curve Point Decompression Attack. 71-84 - Shahin Tajik, Heiko Lohrke, Fatemeh Ganji, Jean-Pierre Seifert, Christian Boit:
Laser Fault Attack on Physically Unclonable Functions. 85-96 - Bilgiday Yuce, Nahid Farhady Ghalaty, Patrick Schaumont
:
Improving Fault Attacks on Embedded Software Using RISC Pipeline Characterization. 97-108

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.