


default search action
FDTC 2014: Busan, South Korea
- Assia Tria, Dooho Choi:

2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2014, Busan, South Korea, September 23, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-6292-1
Invited Paper
- Johannes Blömer, Peter Günther, Gennadij Liske:

Tampering Attacks in Pairing-Based Cryptography. 1-7
Physical and Design Security of ICs
- Thomas Korak, Michael Hoefler:

On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms. 8-17 - Raghavan Kumar, Philipp Jovanovic, Wayne P. Burleson, Ilia Polian:

Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware. 18-28
Algebraic and Differential Fault Analysis
- Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Jerry Shi, Chujiao Ma, Dawu Gu:

Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering. 29-39 - Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay:

Differential Fault Analysis on the Families of SIMON and SPECK Ciphers. 40-48 - Nahid Farhady Ghalaty, Bilgiday Yuce, Mostafa M. I. Taha, Patrick Schaumont

:
Differential Fault Intensity Analysis. 49-58
Fault Models and Countermeasures
- Oliver Mischke, Amir Moradi

, Tim Güneysu
:
Fault Sensitivity Analysis Meets Zero-Value Attack. 59-67 - Pablo Rauzy

, Sylvain Guilley:
Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA. 68-82 - Hélène Le Bouder, Gaël Thomas, Yanis Linge, Assia Tria:

On Fault Injections in Generalized Feistel Networks. 83-93
Simulated and Experimental Attacks
- Roman Korkikian, Sylvain Pelissier, David Naccache:

Blind Fault Attack against SPN Ciphers. 94-103 - Thomas Korak, Michael Hutter, Baris Ege, Lejla Batina:

Clock Glitch Attacks in the Presence of Heating. 104-114 - Ronan Lashermes, Marie Paindavoine, Nadia El Mrabet

, Jacques J. A. Fournier, Louis Goubin:
Practical Validation of Several Fault Attacks against the Miller Algorithm. 115-122 - Johannes Blömer, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, Jean-Pierre Seifert:

A Practical Second-Order Fault Attack against a Real-World Pairing Implementation. 123-136

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














