메뉴 건너뛰기




Volumn , Issue , 2014, Pages 18-28

Parametric trojans for fault-injection attacks on cryptographic hardware

Author keywords

fault injection; fault based cryptanalysis; hardware Trojans

Indexed keywords

CRYPTOGRAPHY; HARDWARE SECURITY; SOFTWARE TESTING;

EID: 84920548347     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FDTC.2014.12     Document Type: Conference Paper
Times cited : (67)

References (17)
  • 1
    • 76949093207 scopus 로고    scopus 로고
    • A survey of hardware trojan taxonomy and detection
    • M. Tehranipoor and F. Koushanfar, "A Survey of Hardware Trojan Taxonomy and Detection," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 10-25, 2010.
    • (2010) IEEE Design & Test of Computers , vol.27 , Issue.1 , pp. 10-25
    • Tehranipoor, M.1    Koushanfar, F.2
  • 2
    • 84885619136 scopus 로고    scopus 로고
    • Trojan detection via delay measurements: A new approach to select paths and vectors to maximize effectiveness and minimize cost
    • B. Cha and S. Gupta, "Trojan Detection Via Delay Measurements: A New Approach to Select Paths and Vectors to Maximize Effectiveness and Minimize Cost," in Design Automation and Test in Europe, 2013, pp. 1265-1270.
    • (2013) Design Automation and Test in Europe , pp. 1265-1270
    • Cha, B.1    Gupta, S.2
  • 3
    • 84890620790 scopus 로고    scopus 로고
    • Circuit camouflage technology-smi ip protection and anti-tamper technologies
    • S. International, "Circuit Camouflage Technology-SMI IP Protection and Anti-Tamper Technologies," White Paper Version 1. 9. 8j, 2012.
    • (2012) White Paper Version 1. 9. 8j
    • International, S.1
  • 4
    • 84867877630 scopus 로고    scopus 로고
    • Fault injection attacks on cryptographic devices: Theory, practice and countermeasures
    • A. Barenghi, L. Breveglieri, I. Koren, and D. Naccache, "Fault Injection Attacks on Cryptographic Devices: Theory, Practice and Countermeasures," Proc. IEEE, vol. 99, 2012.
    • (2012) Proc. IEEE , vol.99
    • Barenghi, A.1    Breveglieri, L.2    Koren, I.3    Naccache, D.4
  • 5
    • 79958840687 scopus 로고    scopus 로고
    • Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault
    • M. Tunstall, D. Mukhopadhyay, and S. Ali, "Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault," LNCS, vol. 6633, pp. pp. 224-233, 2011.
    • (2011) LNCS , vol.6633 , pp. 224-233
    • Tunstall, M.1    Mukhopadhyay, D.2    Ali, S.3
  • 9
    • 84914708185 scopus 로고    scopus 로고
    • Differential fault attack on the prince block cipher
    • Report 2013/043
    • L. Song and L. Hu, "Differential Fault Attack on the PRINCE Block Cipher," Cryptology ePrint Archive, Report 2013/043, 2013.
    • (2013) Cryptology EPrint Archive
    • Song, L.1    Hu, L.2
  • 10
    • 31344443130 scopus 로고    scopus 로고
    • The sorcerer's apprentice guide to fault attacks
    • H. Bar-El et al., "The Sorcerer's Apprentice Guide to Fault Attacks," Proc. IEEE, vol. 94, pp. 370-382, 2006.
    • (2006) Proc. IEEE , vol.94 , pp. 370-382
    • Bar-El, H.1
  • 12
    • 84871538539 scopus 로고    scopus 로고
    • Prince-a low-latency block cipher for pervasive computing applications
    • X. Wang and K. Sako, Eds. Springer Berlin Heidelberg
    • J. Borghoff et al., "PRINCE-A Low-Latency Block Cipher for Pervasive Computing Applications," in Advances in Cryptology-ASIACRYPT 2012, ser. Lecture Notes in Computer Science, X. Wang and K. Sako, Eds. Springer Berlin Heidelberg, 2012, vol. 7658, pp. 208-225.
    • (2012) Advances in Cryptology-ASIACRYPT 2012, Ser. Lecture Notes in Computer Science , vol.7658 , pp. 208-225
    • Borghoff, J.1
  • 16
    • 77955686441 scopus 로고    scopus 로고
    • Power supply noise: Causes, effects, and testing
    • I. Polian, "Power Supply Noise: Causes, Effects, and Testing," ASP Jour. Low-Power Electronics, vol. 6, no. 2, pp. 326-338, 2010.
    • (2010) ASP Jour. Low-Power Electronics , vol.6 , Issue.2 , pp. 326-338
    • Polian, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.