Зарегистрироваться
Восстановить пароль
FAQ по входу

Breier Jakub, Hou Xiaolu, Bhasin Shivam. Automated Methods in Cryptographic Fault Analysis

  • Файл формата pdf
  • размером 8,93 МБ
  • Добавлен пользователем
  • Описание отредактировано
Breier Jakub, Hou Xiaolu, Bhasin Shivam. Automated Methods in Cryptographic Fault Analysis
Springer, 2019. — 342 p. — ISBN: 3030113329.
This book presents a collection of automated methods that are useful for different aspects of fault analysis in cryptography. The first part focuses on automated analysis of symmetric cipher design specifications, software implementations, and hardware circuits. The second part provides automated deployment of countermeasures. The third part provides automated evaluation of countermeasures against fault attacks. Finally, the fourth part focuses on automating fault attack experiments. The presented methods enable software developers, circuit designers, and cryptographers to test and harden their products.
Offers a complete perspective on protecting block ciphers against fault attacks - from analysis to deployment;
Provides automated methods for each stage, supported by evaluation and case studies;
Describes current fault analysis approaches, together with countermeasures;
Includes detailed description of prototypes for each automation method that can be easily implemented and put into industrial applications.
Introduction to Fault Analysis in Cryptography
Automated Fault Analysis of Symmetric Block Ciphers
ExpFault: An Automated Framework for Block Cipher Fault Analysis
Exploitable Fault Space Characterization: A Complementary Approach
Differential Fault Analysis Automation on Assembly Code
An Automated Framework for Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers
Automatic Construction of Fault Attacks on Cryptographic Hardware Implementations
Automated Design and Deployment of Fault Countermeasures
Automated Deployment of Software Encoding Countermeasure
Idempotent Instructions to Counter Fault Analysis Attacks
Differential Fault Attack Resistant Hardware Design Automation
Automated Analysis of Fault Countermeasures
Automated Evaluation of Software Encoding Schemes
Automated Evaluation of Concurrent Error Detection Code Protected Hardware Implementations
Fault Analysis Assisted by Simulation
Automated Fault Attack Experiments
Optimizing Electromagnetic Fault Injection with Genetic Algorithms
Automated Profiling Method for Laser Fault Injection in FPGAs
  • Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.
  • Регистрация