Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers
- 30 Downloads
This work was supported in part by National Natural Science Foundation of China (Grant Nos. 61309021, 61472357, 61571063, 61572028), China Scholarship Council (Grant No. 201606325012), and Project of Science and Technology of Guangdong Province (Grant Nos. 2014A030313439, 2016B010125002).
- 2.Johnson A, Saha S, Chakraborty R, et al. Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet. In: Proceedings of the 9th Workshop on Embedded Systems Security, New Delhi, 2014. 1–8Google Scholar
- 3.Biham E, Shamir A. Differential fault analysis of secret key cryptosystem. In: Proceedings of the 36th International Cryptology Conference. Berlin: Springer, 1997. 513–525Google Scholar
- 5.Zhang F, Zhao X J, Guo S Z, et al. Improved algebraic fault analysis: a case study on piccolo and applications to other lightweight block ciphers. In: Proceedings of the 4th International Conference on Constructive Side-Channel Analysis and Secure Design, Paris, 2013. 62–79Google Scholar