Practical DFA Strategy for AES Under Limited-access Conditions


Secret data in embedded devices can be revealed by injecting computational faults using the fault analysis attacks. The fault analysis researches on a cryptographic implementation by far first assumed a certain fault model, and then discussed the key recovery method under some assumptions. We note that a new remote-fault injection method has emerged, which… (More)
DOI: 10.2197/ipsjjip.22.142


5 Figures and Tables