Author:
Blömer Johannes,Krummel Volker
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. Lecture Notes in Computer Science;E. Biham,1997
2. Lecture Notes in Computer Science;J. Blömer,2004
3. Lecture Notes in Computer Science;J. Blömer,2003
4. Lecture Notes in Computer Science;D. Boneh,1997
5. Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener [21], pp. 398–412 (1999)
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Semi-Permanent Stuck-At Fault injection attacks on Elephant and GIFT lightweight ciphers;ACM Transactions on Design Automation of Electronic Systems;2024-06-21
2. Linked Fault Analysis;IEEE Transactions on Information Forensics and Security;2024
3. SoK: Parameterization of Fault Adversary Models Connecting Theory and Practice;Lecture Notes in Computer Science;2024
4. Fault Attacks and Countermeasures;Cryptography and Embedded Systems Security;2024
5. SoK: Fault Injection Attacks on Cryptosystems;Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy;2023-10-29