FDTC C

14 papers

YearTitle / Authors
20142014 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2014, Busan, South Korea, September 23, 2014
Assia Tria, Dooho Choi
2014A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.
Johannes Blömer, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, Jean-Pierre Seifert
2014Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering.
Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Jerry Shi, Chujiao Ma, Dawu Gu
2014Blind Fault Attack against SPN Ciphers.
Roman Korkikian, Sylvain Pelissier, David Naccache
2014Clock Glitch Attacks in the Presence of Heating.
Thomas Korak, Michael Hutter, Baris Ege, Lejla Batina
2014Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA.
Pablo Rauzy, Sylvain Guilley
2014Differential Fault Analysis on the Families of SIMON and SPECK Ciphers.
Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay
2014Differential Fault Intensity Analysis.
Nahid Farhady Ghalaty, Bilgiday Yuce, Mostafa M. I. Taha, Patrick Schaumont
2014Fault Sensitivity Analysis Meets Zero-Value Attack.
Oliver Mischke, Amir Moradi, Tim Güneysu
2014On Fault Injections in Generalized Feistel Networks.
Hélène Le Bouder, Gaël Thomas, Yanis Linge, Assia Tria
2014On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms.
Thomas Korak, Michael Hoefler
2014Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware.
Raghavan Kumar, Philipp Jovanovic, Wayne P. Burleson, Ilia Polian
2014Practical Validation of Several Fault Attacks against the Miller Algorithm.
Ronan Lashermes, Marie Paindavoine, Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin
2014Tampering Attacks in Pairing-Based Cryptography.
Johannes Blömer, Peter Günther, Gennadij Liske