Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007) 2007
DOI: 10.1109/fdtc.2007.4318989
|View full text |Cite
|
Sign up to set email alerts
|

Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(23 citation statements)
references
References 0 publications
0
23
0
Order By: Relevance
“…Horizontal CPA-Based Combined Attack: This paper points out that the right-to-left version of square-always algorithm is vulnerable to a novel combined attack when the same fault injection model used in the atomicity-based square-and-multiply algorithm in (Amiel et al, 2007) is applied. However, power analysis approach methods of two attacks are different.…”
Section: Improvement Of the Square-always Algorithmmentioning
confidence: 99%
See 3 more Smart Citations
“…Horizontal CPA-Based Combined Attack: This paper points out that the right-to-left version of square-always algorithm is vulnerable to a novel combined attack when the same fault injection model used in the atomicity-based square-and-multiply algorithm in (Amiel et al, 2007) is applied. However, power analysis approach methods of two attacks are different.…”
Section: Improvement Of the Square-always Algorithmmentioning
confidence: 99%
“…They present two types of exponentiation algorithms; left-toright and right-to-left methods. Because the left-to-right-type algorithm is highly vulnerable to the doubling attack (Fouque & Valette, 2003) and the chosen-message SPA attack and is more likely to be subject to combined attacks (Amiel et al, 2007), the right-to-left version of square-always algorithm is generally preferred to the left-to-right one. Their right-to-left multiply-always exponentiation algorithm follows the computational routine of the atomicity-based multiply-always algorithm and uses equation (5) to compute a multiplication.…”
Section: Square-always Exponentiation Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…In practice, the proposed generator is implemented in an FPGA on the Sidechannel Attack Standard Evaluation Board (SASEBO) [10] and, therefore, it can be used as a common experimentation environment for fault injection attacks, where the glitchyclock signals are reproducible. It can also be used to investigate sophisticated attacks combining fault injection attacks and side-channel attacks [11].…”
Section: Introductionmentioning
confidence: 99%