Back to Results
First PageMeta Content
Fault injection / Software testing / RSA / Glitch / Differential fault analysis / Advanced Encryption Standard / Fault / Ciphertext / Power analysis / Cryptography / Geology / Digital electronics


The Sorcerer’s Apprentice Guide to Fault Attacks Hagai Bar-El1 Hamid Choukri2,3 1
Add to Reading List

Document Date: 2004-05-07 04:14:56


Open Document

File Size: 2,43 MB

Share Result on Facebook

City

Nordheim / /

Company

AES / Boeing / Discretix Technologies Ltd. / Hardware Countermeasures Hardware / /

/

Event

Product Issues / Reorganization / /

Facility

University of London / /

IndustryTerm

systematic search / security applications / secret key algorithm / metal meshes / glitch injection electronics / secret key algorithms / Re-computing / cryptographic systems / airborn electronic systems / final exhaustive search / exhaustive search campaigns / aerospace industry / smart card chip / cryptographic algorithms / software countermeasures / electronic devices / claire.whelan@computing.dcu.ie / chip manufacturer / manufacturing / computing / smart-card processors / easy brute-force search / exhaustive search / electronic systems / public key algorithms / /

Organization

Data Aquisition Board / National Aeronautics and Space Administration / Dublin City University / University of London / /

Position

security manager / programmer / /

Product

Fault Injection / RAM / last rounds / plaintext / signature / bit position / ciphertexts / signal / /

ProgrammingLanguage

Java / /

Technology

encryption / Virtual Machine / laser / CMOS technology / RAM / bipolar transistor / 16-round secret key algorithm / semiconductors / public key / public key algorithms / Java / specific smart card chip / known algorithm / smart card / private key / secret key / operating system / smart-card processors / secret key algorithms / /

SocialTag