Author:
Farahmandi Farimah,Rahman M. Sazadur,Rajendran Sree Ranjani,Tehranipoor Mark
Publisher
Springer International Publishing
Reference31 articles.
1. K. Bae, S. Moon, D. Choi, Y. Choi, D.S. Choi, J. Ha, Differential fault analysis on aes by round reduction, in 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT) (2011), pp. 607–612
2. A. Barenghi, L. Breveglieri, I. Koren, D. Naccache, Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures. Proc. IEEE 100(11), 3056–3076 (2012)
3. S. Bhasin, D. Mukhopadhyay, Fault injection attacks: Attack methodologies, injection techniques and protection mechanisms, in International Conference on Security, Privacy, and Applied Cryptography Engineering (Springer, 2016), pp. 415–418
4. S. Bhunia, M. Tehranipoor, Hardware Security: A Hands-On Learning Approach (Morgan Kaufmann, 2018)
5. A. Dehbaoui, J.M. Dutertre, B. Robisson, A. Tria, Electromagnetic transient faults injection on a hardware and a software implementations of aes, in 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography (2012), pp. 7–15. https://doi.org/10.1109/FDTC.2012.15