Author:
Lacombe Guilhem,Feliot David,Boespflug Etienne,Potet Marie-Laure
Funder
Université Grenoble Alpes
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference40 articles.
1. Application of Attack Potential to Smartcards and Similar Devices. Technical Report Version 3.0, Joint Interpretation Library, April 2019
2. ANSSI, Amossys, EDSI, LETI, Lexfo, Oppida, Quarkslab, SERMA, Synacktiv, Thales, and Trusted Labs. Inter-cesti: methodological and technical feedbacks on hardware devices evaluations. In: SSTIC 2020, Symposium sur la sécurité des technologies de l’information et des communications (2020)
3. Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer’s apprentice guide to fault attacks. Proc. IEEE 94(2), 370–382 (2006)
4. Blazy, S., Bühler, D., Yakobowski, B.: Structuring abstract interpreters through state and value abstractions. In: 18th International Conference on Verification Model Checking and Abstract Interpretation (VMCAI 2017), LNCS of Proceedings of the International Conference on Verification Model Checking and Abstract Interpretation, vol. 10145, France, Paris, pp. 112–130 (2017)
5. Boespflug, E., Ene, C., Mounier, L., Potet, M.L.: Countermeasures optimization in multiple fault-injection context. In: Fault Diagnosis and Tolerance in Cryptography,’ FDTC 2020, Milan (Virtual Workshop), Italy (2020)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献