메뉴 건너뛰기




Volumn 153, Issue , 2004, Pages 159-176

A survey on fault attacks

Author keywords

Fault attack' differential fault attack' side channel attack' tamper resistance' smart card

Indexed keywords

SMART CARDS;

EID: 84902496121     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (101)

References (31)
  • 2
    • 84957018842 scopus 로고    scopus 로고
    • Low cost attacks on tamper resistant devices
    • th, of LNCS, Springer
    • th Security Protocols Workshop' volume 1361 of LNCS' pages 125-136. Springer' 1997.
    • (1997) Security Protocols Workshop , vol.1361 , pp. 125-136
    • Anderson, R.1    Kuhn, M.2
  • 3
    • 35248880671 scopus 로고    scopus 로고
    • Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures
    • B. Kaliski Jr.' Ç.K. Koç' and C. Paar' editors, CHES 2002, of LNCS, Springer
    • C. Aumüller' P. Bier' W. Fischer' P. Hofreiter' and J.-P. Seifert. Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures. In B. Kaliski Jr.' Ç.K. Koç' and C. Paar' editors' Cryptographic Hardware and Embedded Systems - CHES 2002' volume 2523 of LNCS' pages 260-275. Springer' 2002.
    • (2002) Cryptographic Hardware and Embedded Systems , vol.2523 , pp. 260-275
    • Aumüller, C.1    Bier, P.2    Fischer, W.3    Hofreiter, P.4    Seifert, J.-P.5
  • 6
    • 84983134283 scopus 로고    scopus 로고
    • Differential Fault Analysis on Elliptic Curve Cryptosystems
    • M. Bellare, CRYPTO 2000, LNCS, Springer-Verlag
    • I. Biehl, B. Meyer' and V. Müller. Differential Fault Analysis on Elliptic Curve Cryptosystems. In M. Bellare" editor" Advances in Cryptology - CRYPTO 2000" volume 1880 of LNCS" pages 131-146. Springer-Verlag" 2000.
    • (2000) Advances In Cryptology , vol.1880 , pp. 131-146
    • Biehl, I.1    Meyer, B.2    Müller, V.3
  • 7
    • 84958641478 scopus 로고    scopus 로고
    • Differential Fault Analysis of Secret Key Cryptosystem
    • In B.S. Kalisky Jr.' editor, CRYPTO '97, LNCS, Springer-Verlag
    • E. Biham and A. Shamir. Differential Fault Analysis of Secret Key Cryptosystem. In B.S. Kalisky Jr.' editor" Advances in Cryptology - CRYPTO '97" volume 1294 of LNCS" pages 513-525. Springer-Verlag" 1997.
    • (1997) Advances In Cryptology , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 8
    • 14844326209 scopus 로고    scopus 로고
    • A New RSA-CRT Algorithm Secure Against Bellcore Attacks
    • ACM Press
    • J. Blömer' M. Otto' and J.-P. Seifert. A New RSA-CRT Algorithm Secure Against Bellcore Attacks. In ACM-CCS'03. ACM Press" 2003.
    • (2003) ACM-CCS'03
    • Otto, J.1    Blömer, M.2    Seifert, J.-P.3
  • 9
    • 35248884880 scopus 로고    scopus 로고
    • Fault based cryptanalysis of the Advanced Encryption Standard
    • In R.N. Wright' editor, FC 2003, LNCS. Springer-Verlag
    • J. Blömer and J.-P. Seifert. Fault based cryptanalysis of the Advanced Encryption Standard. In R.N. Wright' editor" Financial Cryptography - FC 2003" volume 2742 of LNCS. Springer-Verlag" 2003.
    • (2003) Financial Cryptography , vol.2742
    • Blömer, J.1    Seifert, J.-P.2
  • 10
    • 84957355967 scopus 로고    scopus 로고
    • On the Importance of Checking Cryptographic Protocols for Faults
    • In W. Fumy' editor, EUROCRYPT '97, of LNCS, Springer-Verlag
    • D. Boneh" R.A. DeMillo' and R.J. Lipton. On the Importance of Checking Cryptographic Protocols for Faults. In W. Fumy' editor" Advances in Cryptology - EUROCRYPT '97" volume 1233 of LNCS" pages 37-51. Springer-Verlag" 1997.
    • (1997) Advances In Cryptology , vol.1233 , pp. 37-51
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 11
    • 3042641393 scopus 로고    scopus 로고
    • On the Importance of Eliminating Errors in Cryptographic Computations
    • An earlier version was published at EUROCRYPT'97 [10]
    • D. Boneh" R.A. DeMillo' and R.J. Lipton. On the Importance of Eliminating Errors in Cryptographic Computations. Journal of Cryptology" 14(2):101-119" 2001. An earlier version was published at EUROCRYPT'97 [10].
    • (2001) Journal of Cryptology , vol.14 , Issue.2 , pp. 101-119
    • Boneh, D.1    Demillo', R.A.2    Lipton, R.J.3
  • 12
    • 63449097489 scopus 로고    scopus 로고
    • Differential Fault Analysis on AES Key Schedule and ome Countermeasures
    • In R. Safavi-Naini and J. Seberry' editors, ACISP 2003, of LNCS, Springer-Verlag
    • C.-N. Chen and S.-M. Yen. Differential Fault Analysis on AES Key Schedule and ome Countermeasures. In R. Safavi-Naini and J. Seberry' editors" Information Security and Privacy - 8th Australasian Conference - ACISP 2003" volume 2727 of LNCS" pages 118-129. Springer-Verlag" 2003.
    • (2003) Information Security and Privacy - 8th Australasian Conference , vol.2727 , pp. 118-129
    • Chen, C.-N.1    Yen, S.-M.2
  • 13
    • 33645604900 scopus 로고    scopus 로고
    • Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
    • To appear
    • M. Ciet and M. Joye. Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults. In Designs' Codes and Cryptography" 2004. To appear.
    • (2004) Designs' Codes and Cryptography
    • Ciet, M.1    Joye, M.2
  • 15
    • 84902512044 scopus 로고    scopus 로고
    • Fault and chosen modulus attacks on some NESSIE asymetrique Primitives. Technical report' NESSIE' Available from, February
    • E. Dottax. Fault and chosen modulus attacks on some NESSIE asymetrique Primitives. Technical report' NESSIE' Available from https://www.cosic.esat.kuleuven.ac.be/nessie/reports/phase2/ChosenModAtt2.pdf" February 2003.
    • (2003)
    • Dottax, E.1
  • 17
  • 18
    • 0004794569 scopus 로고    scopus 로고
    • Chinese Remaindering Based Cryptosystems in the Presence of Faults
    • M. Joye" A.K. Lenstra' and J.-J. Quisquater. Chinese Remaindering Based Cryptosystems in the Presence of Faults. Journal of Cryptology" 12(4):241-246" 1999.
    • Journal of Cryptology , vol.12 , Issue.4 , pp. 241-246
    • Joye, M.1    Lenstra, A.K.2    Quisquater, J.-J.3
  • 19
    • 84949230268 scopus 로고    scopus 로고
    • RSA-type Signatures in the Presence of Transient Faults
    • In M. Darnell' editor, LNCS, Springer-Verlag
    • M. Joye' J.-J. Quisquater' F. Bao' and R.H. Deng. RSA-type Signatures in the Presence of Transient Faults. In M. Darnell' editor" Cryptography and Coding" volume 1355 of LNCS" pages 155-160. Springer-Verlag" 1997.
    • Cryptography and Coding , vol.1355 , pp. 155-160
    • Bao, M.1    Joye, J.-J.2    Quisquater, F.3    Deng, R.H.4
  • 20
    • 84944881697 scopus 로고    scopus 로고
    • Observability Analysis - Detecting When Improved Cryptosystems Fail
    • In B. Preneel' editor, CT-RSA 2002, of LNCS, Springer-Verlag
    • M. Joye' J.-J. Quisquater' S.-M. Yen' and M. Yung. Observability Analysis - Detecting When Improved Cryptosystems Fail -. In B. Preneel' editor" Topics in Cryptology - CT-RSA 2002" volume 2271 of LNCS" pages 17-29. Springer-Verlag" 2002.
    • (2002) Topics In Cryptology , vol.2271 , pp. 17-29
    • Yen, M.1    Joye, J.-J.2    Quisquater, S.-M.3    Yung, M.4
  • 21
    • 26344445171 scopus 로고    scopus 로고
    • Further Results and Considerations on Side Channel Attacks on RSA
    • In B. Kaliski Jr.' Ç.K. Koç' and C. Paar' editors, CHES 2002, of LNCS, Springer-Verlag
    • V. Klíma and T. Rosa. Further Results and Considerations on Side Channel Attacks on RSA. In B. Kaliski Jr.' Ç.K. Koç' and C. Paar' editors" Cryptographic Hardware and Embedded Systems - CHES 2002" volume 2523 of LNCS" pages 244-259. Springer-Verlag" 2002.
    • (2002) Cryptographic Hardware and Embedded Systems , vol.2523 , pp. 244-259
    • Klíma, V.1    Rosa, T.2
  • 24
    • 84948990454 scopus 로고    scopus 로고
    • Fault Induction Attacks' Tamper Resistance' and Hostile Reverse Engineering in Perspective
    • In R. Hirschfeld' editor, FC '97, of LNCS, Springer-Verlag
    • D.P. Maher. Fault Induction Attacks' Tamper Resistance' and Hostile Reverse Engineering in Perspective. In R. Hirschfeld' editor" Financial Cryptography - FC '97" volume 1318 of LNCS" pages 109-121. Springer-Verlag" 1997.
    • (1997) Financial Cryptography , vol.1318 , pp. 109-121
    • Maher, D.P.1
  • 25
    • 35248837397 scopus 로고    scopus 로고
    • A Differential Fault Attack Technique Against SPN Structures' with Application to the AES and KHAZAD
    • In C.D. Walter' Ç.K. Koç' and C. Paar' editors, CHES 2003, of LNCS, Springer-Verlag
    • G. Piret and J.-J. Quisquater. A Differential Fault Attack Technique Against SPN Structures' with Application to the AES and KHAZAD. In C.D. Walter' Ç.K. Koç' and C. Paar' editors" Cryptographic Hardware and Embedded Systems - CHES 2003" volume 2779 of LNCS" pages 77-88. Springer-Verlag" 2003.
    • (2003) Cryptographic Hardware and Embedded Systems , vol.2779 , pp. 77-88
    • Piret, G.1    Quisquater, J.-J.2
  • 27
    • 35248813476 scopus 로고    scopus 로고
    • Optical Fault Induction Attack
    • In B. Kaliski Jr.' Ç.K. Koç' and C. Paar' editors, CHES 2002, of LNCS, Springer
    • S. Skorobogatov and R. Anderson. Optical Fault Induction Attack. In B. Kaliski Jr.' Ç.K. Koç' and C. Paar' editors" Cryptographic Hardware and Embedded Systems - CHES 2002" volume 2523 of LNCS" pages 2-12. Springer" 2002.
    • (2002) Cryptographic Hardware and Embedded Systems , vol.2523 , pp. 2-12
    • Skorobogatov, S.1    Anderson, R.2
  • 28
    • 35048828598 scopus 로고    scopus 로고
    • A DFA on Rijndael
    • In A.H. Chan and V. Gligor' editors, ISC 2002, of LNCS, Springer
    • S.-M. Yen and J.Z. Chen. A DFA on Rijndael. In A.H. Chan and V. Gligor' editors" Information Security - ISC 2002" volume 2433 of LNCS. Springer" 2002.
    • (2002) Information Security , vol.2433
    • Yen, S.-M.1    Chen, J.Z.2
  • 29
    • 0034276289 scopus 로고    scopus 로고
    • Checking before output may not be enough against fault-based cryptanalysis
    • S.-M. Yen and M. Joye. Checking before output may not be enough against fault-based cryptanalysis. IEEE Trans. on Computers" 49(9):967-970" 2000.
    • (2000) IEEE Trans. On Computers , vol.49 , Issue.9 , pp. 967-970
    • Yen, S.-M.1    Joye, M.2
  • 30
    • 84949979593 scopus 로고    scopus 로고
    • A Countermeasure against one Physical Cryptanalysis May Benefit Another Attack
    • In K. Kim' editor, ICISC 2001, of LNCS, Springer-Verlag
    • S.-M. Yen" S.-J. Kim" S.-G. Lim' and S.-J. Moon. A Countermeasure against one Physical Cryptanalysis May Benefit Another Attack. In K. Kim' editor" Information Security and Cryptology - ICISC 2001" volume 2288 of LNCS" pages 414-427. Springer-Verlag" 2001.
    • (2001) Information Security and Cryptology , vol.2288 , pp. 414-427
    • Yen, S.-M.1    Kim, S.-J.2    Lim', S.-G.3    Moon, S.-J.4
  • 31
    • 63449111952 scopus 로고    scopus 로고
    • Permanent Fault Attack on RSA with CRT
    • In R. Safavi-Naini and J. Seberry' editors, ACISP 2003, of LNCS, Springer-Verlag
    • S.-M. Yen" S.J. Moon' and J.-C. Ha. Permanent Fault Attack on RSA with CRT. In R. Safavi-Naini and J. Seberry' editors" Information Security and Privacy - 8th Australasian Conference - ACISP 2003" volume 2727 of LNCS" pages 285-296. Springer-Verlag" 2003.
    • (2003) Information Security and Privacy - 8th Australasian Conference , vol.2727 , pp. 285-296
    • Yen, S.-M.1    Moon', S.J.2    Ha, J.-C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.