Differential Fault Analysis of Secret Key Cryptosystems

@inproceedings{Biham1997DifferentialFA,
  title={Differential Fault Analysis of Secret Key Cryptosystems},
  author={E. Biham and A. Shamir},
  booktitle={CRYPTO},
  year={1997}
}
  • E. Biham, A. Shamir
  • Published in CRYPTO 1997
  • Computer Science
  • In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to find cryptographic keys. Their attack is based on algebraic properties of modular arithmetic, and thus it is applicable only to public key cryptosystems such as RSA, and not to secret key algorithms such as the Data Encryption Standard (DES). 
    1,517 Citations
    Evaluating Differential Fault Analysis of Unknown Cryptosystems
    • 13
    Differential Fault Attacks on Elliptic Curve Cryptosystems
    • 299
    • PDF
    Side channel cryptanalysis of product ciphers
    • 228
    Side Channel Cryptanalysis of Product Ciphers
    • 218
    • PDF
    Differential Fault Attack on
    • 1
    • Highly Influenced
    Improved Constructions of PRFs Secure Against Related-Key Attacks
    • 24
    • PDF
    Chinese Remaindering Based Cryptosystems in the Presence of Faults
    • 156
    • PDF
    Probing Attacks on Tamper-Resistant Devices
    • 54
    • PDF

    References

    SHOWING 1-10 OF 50 REFERENCES
    Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
    • 270
    • PDF
    Differential-Linear Cryptanalysis
    • 211
    • PDF
    Differential Cryptanalysis of the Data Encryption Standard
    • 919
    • PDF
    Linear Cryptanalysis Method for DES Cipher
    • 2,507
    • PDF
    Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
    • 876
    • PDF
    Markov Ciphers and Differential Cryptanalysis
    • 611
    • PDF
    Advances in Cryptology: Proceedings Of Crypto 83
    • 345
    The RC5 Encryption Algorithm
    • 937
    • PDF