2012 Workshop on Fault Diagnosis and Tolerance in Cryptography 2012
DOI: 10.1109/fdtc.2012.15
|View full text |Cite
|
Sign up to set email alerts
|

Electromagnetic Transient Faults Injection on a Hardware and a Software Implementations of AES

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
124
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 165 publications
(124 citation statements)
references
References 14 publications
0
124
0
Order By: Relevance
“…A study about the emg localized effect is presented in [9]. As reported by the authors, the propagation delays are increased through the circuit's logic when the emg is injected on top of the die surface.…”
Section: Electromagnetic Glitch Injection Techniquementioning
confidence: 94%
See 3 more Smart Citations
“…A study about the emg localized effect is presented in [9]. As reported by the authors, the propagation delays are increased through the circuit's logic when the emg is injected on top of the die surface.…”
Section: Electromagnetic Glitch Injection Techniquementioning
confidence: 94%
“…According to previous experiments in [9] on a basic 8-bit avr microcontroller, an emg induces faults during the program execution. A careful analysis of the faulty behavior, revealed that they were due to an instruction skip at the instant of the emg injection.…”
Section: Electromagnetic Glitch Injection Techniquementioning
confidence: 99%
See 2 more Smart Citations
“…An outstanding semi-invasive attack is fault injection, in which atypical environmental conditions are instigated during cryptographic operation in order to uncover the internal states, and which can breach a circuit faster than noninvasive attacks [48,[56][57][58]. Fault injection employs power tampering, short clock signals, large temperature variations, external electromagnetic fields, and light attacks such as pulsed lasers or ultraviolet lamps [59][60][61][62][63][64] to alter the state of chosen transistors in the IC, allowing a pirate to figure out the operation of the IC and ways to bypass its security features.…”
Section: Types Of Attacksmentioning
confidence: 99%