{"title":"故障攻击稳健TRNG","authors":"E. Böhl, Markus Ihle","doi":"10.1109/IOLTS.2012.6313851","DOIUrl":null,"url":null,"abstract":"True random number generators (TRNGs) are used for cryptographic operations. By the use of TRNGs secret keys can be generated and the design can be made robust against attacks. In order to simplify further attacks the adversary tries to introduce some bias in the probability distribution of the TRNG output. A possibility to detect such attacks is shown in this paper. In difference to the most former publications all investigations are performed taking into account realistic technology parameters and parasitics.","PeriodicalId":246222,"journal":{"name":"2012 IEEE 18th International On-Line Testing Symposium (IOLTS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"A fault attack robust TRNG\",\"authors\":\"E. Böhl, Markus Ihle\",\"doi\":\"10.1109/IOLTS.2012.6313851\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"True random number generators (TRNGs) are used for cryptographic operations. By the use of TRNGs secret keys can be generated and the design can be made robust against attacks. In order to simplify further attacks the adversary tries to introduce some bias in the probability distribution of the TRNG output. A possibility to detect such attacks is shown in this paper. In difference to the most former publications all investigations are performed taking into account realistic technology parameters and parasitics.\",\"PeriodicalId\":246222,\"journal\":{\"name\":\"2012 IEEE 18th International On-Line Testing Symposium (IOLTS)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-06-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE 18th International On-Line Testing Symposium (IOLTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IOLTS.2012.6313851\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE 18th International On-Line Testing Symposium (IOLTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IOLTS.2012.6313851","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
True random number generators (TRNGs) are used for cryptographic operations. By the use of TRNGs secret keys can be generated and the design can be made robust against attacks. In order to simplify further attacks the adversary tries to introduce some bias in the probability distribution of the TRNG output. A possibility to detect such attacks is shown in this paper. In difference to the most former publications all investigations are performed taking into account realistic technology parameters and parasitics.