Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin
Journal of Systems and Software
Differential fault analysis on Camellia
Journal of Systems and Software
New fault attacks using Jacobi symbol and application to regular right-to-left algorithms
Information Processing Letters
Differential fault analysis of ARIA in multi-byte fault models
Journal of Systems and Software
Complete atomic blocks for elliptic curves in jacobian coordinates over prime fields
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
Java card combined attacks with localization-agnostic fault injection
CARDIS'12 Proceedings of the 11th international conference on Smart Card Research and Advanced Applications
Hi-index | 0.00 |
In a fault attack, errors are induced during the computation of a cryptographic algorithm, and the faulty results are exploited to extract information about the secret key in embedded systems. Fault attacks can break an unprotected system more quickly than any other kind of side-channel attack. Furthermore, protecting against fault attacks is more costly in terms of chip area. This sidebar surveys fault injection methods, types of faults, and fault attack models.