2019
DOI: 10.1007/978-3-030-16350-1_5
|View full text |Cite
|
Sign up to set email alerts
|

FIMA: Fault Intensity Map Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…Next, we give a list of papers that either evaluate the side-channel and fault resistance of Ascon or elaborate protection mechanisms against side-channel and fault attacks [4,7,12,[28][29][30]50,51,55,60,68,[77][78][79]83].…”
Section: Implementation Security and Robustnessmentioning
confidence: 99%
“…Next, we give a list of papers that either evaluate the side-channel and fault resistance of Ascon or elaborate protection mechanisms against side-channel and fault attacks [4,7,12,[28][29][30]50,51,55,60,68,[77][78][79]83].…”
Section: Implementation Security and Robustnessmentioning
confidence: 99%
“…Fault Intensity Map Analysis (FIMA) is a recent method introduced by Ramezanpour et al [77] that uses information from fault bias and the correlation between fault distribution and intensity to recover the secret. In general, it combines several existing techniques fault sensitivity analysis (FSA), differential fault intensity analysis (DFIA), ciphertext-only fault analysis (CFA), and statistical ineffective fault analysis (SIFA).…”
Section: Fault Intensity Map Analysis (Fima)mentioning
confidence: 99%
“…Fault Intensity Map Analysis (FIMA) [RAD19b] builds on and generalizes DFIA and biased-based techniques, such as SIFA. It combines the biased distribution of correct ciphertexts under a correct key hypothesis with the variation of data distribution with fault intensity to reduce the number of faults required to recover a secret key.…”
Section: Related Workmentioning
confidence: 99%
“…It combines the biased distribution of correct ciphertexts under a correct key hypothesis with the variation of data distribution with fault intensity to reduce the number of faults required to recover a secret key. FIMA with neural network key distinguisher (FIMA-NN) [RAD19b,RAD19a] builds upon this, using a neural network to rank key candidates. FIMA has similar disadvantages to SIFA: it requires the ciphertext, and requires guessing 32-bit chunks of the key.…”
Section: Related Workmentioning
confidence: 99%