Fault Analysis in Cryptography

@inproceedings{Joye2012FaultAI,
  title={Fault Analysis in Cryptography},
  author={Marc Joye and Michael Tunstall},
  booktitle={Information Security and Cryptography},
  year={2012}
}
Side-channel attacks are a class of attacks where an attacker deduces the internal state of a device by observing information that leaks during the normal functioning of the device. In this chapter we describe side-channel analysis and its relevance to fault attacks. Side-channel analysis is typically used to extract information about cryptographic keys. However, we will be concentrating on how it can be used as a means to identify target operations and as a trigger mechanism for fault attacks. 
Highly Cited
This paper has 94 citations. REVIEW CITATIONS
Related Discussions
This paper has been referenced on Twitter 6 times. VIEW TWEETS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 44 extracted citations

Laser Fault Injection at the CMOS 28 nm Technology Node: an Analysis of the Fault Model

2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) • 2018
View 4 Excerpts
Highly Influenced

Persistent Fault Analysis on Block Ciphers

IACR Trans. Cryptogr. Hardw. Embed. Syst. • 2018

Theoretical Round Modification Fault Analysis on AEGIS-128 with Algebraic Techniques

2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) • 2018

94 Citations

01020'11'13'15'17'19
Citations per Year
Semantic Scholar estimates that this publication has 94 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 111 references

Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults

IACR Cryptology ePrint Archive • 2003
View 13 Excerpts
Highly Influenced

Advanced Encryption Standard (AES) - An Update.

IMA Int. Conf. • 1999
View 16 Excerpts
Highly Influenced

Algorithm-level error detection for Montgomery ladder-based ECSM

Journal of Cryptographic Engineering • 2011
View 4 Excerpts
Highly Influenced

Generic approach for hardening state machines against strong adversaries

IET Computers & Digital Techniques • 2010
View 5 Excerpts
Highly Influenced

Low voltage fault attacks to AES

2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) • 2010
View 4 Excerpts
Highly Influenced

Error Detection and Fault Tolerance in ECSM Using Input Randomization

IEEE Transactions on Dependable and Secure Computing • 2009
View 10 Excerpts
Highly Influenced

Fault Attacks Against EMV Signatures

IACR Cryptology ePrint Archive • 2009
View 5 Excerpts
Highly Influenced

An On-Line Fault Detection Scheme for SBoxes in Secure Circuits

13th IEEE International On-Line Testing Symposium (IOLTS 2007) • 2007
View 6 Excerpts
Highly Influenced