Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Primas, Robert"'
Implementation attacks like side-channel and fault attacks pose a considerable threat to cryptographic devices that are physically accessible by an attacker. As a consequence, devices like smart cards implement corresponding countermeasures like redu
Externí odkaz:
http://arxiv.org/abs/2107.01917
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Innovations in Systems & Software Engineering; Sep2022, Vol. 18 Issue 3, p471-481, 11p
Autor:
Daemen, Joan, Dobraunig, Christoph, Eichlseder, Maria, Gross, Hannes, Mendel, Florian, Primas, Robert
Statistical Ineffective Fault Attacks (SIFA) pose a threat for many practical implementations of symmetric primitives. Countermeasures against both power analysis and fault attacks typically do not prevent straightforward SIFA attacks, which require
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=sygma_______::dcdef0f54fa1f2ac030e364e2feb4c22
https://doi.org/10.13154/tches.v2020.i3.508-543
https://doi.org/10.13154/tches.v2020.i3.508-543
Publikováno v:
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 3, pp. 243-268
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 3 (2020)
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 243-268
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 3 (2020)
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 243-268
Since its selection as the winner of the SHA-3 competition, Keccak, with all its variants, has found a large number of applications. It is, for instance, a common building block in schemes submitted to NIST’s post-quantum cryptography project. In m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1414332f7527e4c179df6e9023311117
https://hdl.handle.net/2066/221054
https://hdl.handle.net/2066/221054
Autor:
Dobraunig, Christoph, Eichlseder, Maria, Korak, Thomas, Mangard, Stefan, Mendel, Florian, Primas, Robert
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 3 (2018)
Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and techniques for fault attacks and countermeasures have been studied extensively. The vast majority of the literature on fault attacks focuses on the ability
Publikováno v:
In Engineering Fracture Mechanics 2002 69(10):1129-1148
Publikováno v:
AIAA Journal. Dec2006, Vol. 44 Issue 12, p2949-2949. 1p.