Author:
Kim Chong Hee,Quisquater Jean-Jacques
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. Lecture Notes in Computer Science;C. Aumüller,2003
2. http://www.atmel.com/product/AVR/
3. Bar-El, H., et al.: The Sorcerers apprentice guide to fault attacks. In: Workshop on Fault Diagnosis and Tolerence in Cryptgraphy in association with DSN 2004 – The International Conference on Dependable Systems and Networks, pp. 330–342 (2004)
4. Lecture Notes in Computer Science;D. Boneh,1997
5. Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of eliminating errors in cryptographic computations. Journal of Cryptology 14(2), 101–119 (2001), An earlier version appears in: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997)
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Obelix: Mitigating Side-Channels Through Dynamic Obfuscation;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
2. Fault Attacks and Countermeasures;Cryptography and Embedded Systems Security;2024
3. Diversity Algorithms for Laser Fault Injection;Lecture Notes in Computer Science;2024
4. Passive SSH Key Compromise via Lattices;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
5. Investigating the Effect of Electromagnetic Fault Injections on the Configuration Memory of SRAM-Based FPGA Devices;2023 IEEE Physical Assurance and Inspection of Electronics (PAINE);2023-10-24