{"title":"Fault Attacks on Stream Ciphers","authors":"Alessandro Barenghi, E. Trichina","doi":"10.1007/978-3-642-29656-7_14","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_14","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123481627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Side-Channel Analysis and Its Relevance to Fault Attacks","authors":"E. Oswald, François-Xavier Standaert","doi":"10.1007/978-3-642-29656-7_1","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_1","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117171381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Alkhoraidly, Agustin Dominguez-Oviedo, M. A. Hasan
{"title":"Fault Attacks on Elliptic Curve Cryptosystems","authors":"A. Alkhoraidly, Agustin Dominguez-Oviedo, M. A. Hasan","doi":"10.1007/978-3-642-29656-7_9","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_9","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128437999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Countermeasures for Symmetric Key Ciphers","authors":"Jörn-Marc Schmidt, M. Medwed","doi":"10.1007/978-3-642-29656-7_5","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_5","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115624095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differential Fault Analysis of the Advanced Encryption Standard","authors":"Christophe Giraud","doi":"10.1007/978-3-642-29656-7_4","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_4","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125078470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault Attacks on Pairing-Based Cryptography","authors":"Nadia El Mrabet, D. Page, F. Vercauteren","doi":"10.1007/978-3-642-29656-7_13","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_13","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"327 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115966597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Global Faults on Cryptographic Circuits","authors":"S. Guilley, J. Danger","doi":"10.1007/978-3-642-29656-7_17","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_17","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"42 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120877465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Takahashi, Toshinori Fukunaga, Shigeto Gomisawa, Yang Li, K. Sakiyama, K. Ohta
{"title":"Fault Injection and Key Retrieval Experiments on an Evaluation Board","authors":"J. Takahashi, Toshinori Fukunaga, Shigeto Gomisawa, Yang Li, K. Sakiyama, K. Ohta","doi":"10.1007/978-3-642-29656-7_18","DOIUrl":"https://doi.org/10.1007/978-3-642-29656-7_18","url":null,"abstract":"","PeriodicalId":405617,"journal":{"name":"Fault Analysis in Cryptography","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121586298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}