Author:
Farahmandi Farimah,Rahman M. Sazadur,Rajendran Sree Ranjani,Tehranipoor Mark
Publisher
Springer International Publishing
Reference30 articles.
1. S. Aftabjahani, R. Kastner, M. Tehranipoor, F. Farahmandi, J. Oberg, A. Nordstrom, N. Fern, A. Althoff, Special session: Cad for hardware security-automation is key to adoption of solutions, in 2021 IEEE 39th VLSI Test Symposium (VTS) (IEEE, 2021), pp. 1–10
2. S. Bhasin, D. Mukhopadhyay, Fault injection attacks: Attack methodologies, injection techniques and protection mechanisms, in International Conference on Security, Privacy, and Applied Cryptography Engineering (Springer, 2016), pp. 415–418
3. D. Boneh, R.A. DeMillo, R.J. Lipton, On the importance of eliminating errors in cryptographic computations. J. Cryptol. 14(2), 101–119 (2001)
4. A. Dehbaoui, J.M. Dutertre, B. Robisson, P. Orsatelli, P. Maurine, A. Tria, Injection of transient faults using electromagnetic pulses practical results on a cryptographic system. ACR Cryptol. (2012) ePrint Archive
5. A. Dehbaoui, J.M. Dutertre, B. Robisson, A. Tria, Electromagnetic transient faults injection on a hardware and a software implementations of aes, in 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography (IEEE, 2012), pp. 7–15