Differential fault analysis

Known as: DFA, Differential fault attack, Fault attack 
Differential fault analysis (DFA) is a type of side channel attack in the field of cryptography, specifically cryptanalysis. The principle is to… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
In this paper, we present two differential fault analyses on PRESENT-80 which is a lightweight block cipher. The first attack is… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2013
2013
CLEFIA is already shown to be vulnerable to differential fault analysis (DFA). The existing state-of-the-art DFA shows that two… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
This paper presents a DFA on Grøstl-256, a hash algorithm that imitates the main structures of AES. Although our attack is… (More)
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2011
2011
Combining different cryptanalytic methods to attack a cryptosystem became one of the hot topics in cryptanalysis. In particular… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In this paper we present a differential fault attack that can be applied to the AES using a single fault. We demonstrate that… (More)
  • figure 3
  • figure 4
Is this relevant?
2009
2009
SHACAL-1, known as one of the finalists of the NESSIE project, originates from the compression component of the widely used hash… (More)
  • figure 1
  • table I
  • figure 2
  • figure 3
  • table II
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Trivium is a hardware-oriented stream cipher designed in 2005 by de Cannière and Preneel for the European project eStream, and it… (More)
Is this relevant?
2008
2008
We propose a more efficient differential fault analysis (DFA) attack on CLEFIA, the 128-bit block cipher developed by Sony… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We explain how a differential fault analysis (DFA) works on AES 128, 192 or 256 bits. 
  • figure 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In this paper we describe a differential fault attack technique working against Substitution-Permutation Networks, and requiring… (More)
  • figure 1
  • table 2
  • table 1
  • table 3
Is this relevant?