Publication | Closed Access
XFC
31
Citations
13
References
2017
Year
Unknown Venue
Hardware SecurityReliability EngineeringEngineeringInformation SecurityCryptanalytic AttackFault AttackFault AnalysisComputer EngineeringFault AttacksFault RecoveryComputer ScienceBlock CipherIdeal Fault AttackFormal VerificationFault InjectionCryptography
Fault attacks recover secret keys by exploiting faults injected during the execution of a block cipher. However, not all faults are exploitable and every exploitable fault is associated with an offline complexity to determine the key. The ideal fault attack would recover maximum key bits with minimum offline effort. Finding the ideal fault attack for a block cipher is a laborious manual task, which can take several months to years before such an attack is discovered.
| Year | Citations | |
|---|---|---|
Page 1
Page 1