Fault Analysis in Cryptography

Editors:

ISBN: 978-3-642-29655-0 (Print) 978-3-642-29656-7 (Online)

Table of contents (18 chapters)

  1. Front Matter

    Pages i-xvi

  2. IntroductoryMaterial

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-15

      Side-Channel Analysis and Its Relevance to Fault Attacks

  3. Fault Analysis in Secret Key Cryptography

    1. Front Matter

      Pages 17-17

    2. No Access

      Book Chapter

      Pages 19-35

      Attacking Block Ciphers

    3. No Access

      Book Chapter

      Pages 37-54

      Differential Fault Analysis of DES

    4. No Access

      Book Chapter

      Pages 55-72

      Differential Fault Analysis of the Advanced Encryption Standard

    5. No Access

      Book Chapter

      Pages 73-87

      Countermeasures for Symmetric Key Ciphers

    6. No Access

      Book Chapter

      Pages 89-108

      On Countermeasures Against Fault Attacks on the Advanced Encryption Standard

  4. Fault Analysis in Public Key Cryptography

    1. Front Matter

      Pages 109-109

    2. No Access

      Book Chapter

      Pages 111-124

      A Survey of Differential Fault Analysis Against Classical RSA Implementations

    3. No Access

      Book Chapter

      Pages 125-136

      Fault Attacks Against RSA-CRT Implementation

    4. No Access

      Book Chapter

      Pages 137-155

      Fault Attacks on Elliptic Curve Cryptosystems

    5. No Access

      Book Chapter

      Pages 157-169

      On Countermeasures Against Fault Attacks on Elliptic Curve Cryptography Using Fault Detection

    6. No Access

      Book Chapter

      Pages 171-199

      Design of Cryptographic Devices Resilient to Fault Injection Attacks Using Nonlinear Robust Codes

    7. No Access

      Book Chapter

      Pages 201-220

      Lattice-Based Fault Attacks on Signatures

    8. No Access

      Book Chapter

      Pages 221-236

      Fault Attacks on Pairing-Based Cryptography

  5. Miscellaneous

    1. Front Matter

      Pages 237-237

    2. No Access

      Book Chapter

      Pages 239-255

      Fault Attacks on Stream Ciphers

    3. No Access

      Book Chapter

      Pages 257-272

      Interaction Between Fault Attack Countermeasures and the Resistance Against Power Analysis Attacks

  6. Implementing Fault Attacks

    1. Front Matter

      Pages 273-273

    2. No Access

      Book Chapter

      Pages 275-293

      Injection Technologies for Fault Attacks on Microprocessors

    3. No Access

      Book Chapter

      Pages 295-311

      Global Faults on Cryptographic Circuits

    4. No Access

      Book Chapter

      Pages 313-331

      Fault Injection and Key Retrieval Experiments on an Evaluation Board

  7. Back Matter

    Pages 333-354