Differential Fault Analysis of SHA-3 Under Relaxed Fault Models
- 1 June 2017
- journal article
- research article
- Published by Springer Science and Business Media LLC in Journal of Hardware and Systems Security
- Vol. 1 (2), 156-172
- https://doi.org/10.1007/s41635-017-0011-4
Abstract
No abstract availableKeywords
Funding Information
- National Science Foundation (SaTC-1314655)
- National Science Foundation (MRI-1337854)
This publication has 22 references indexed in Scilit:
- Differential Fault Analysis of StreebogLecture Notes in Computer Science, 2015
- Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 AlgorithmIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2014
- Differential Biases in Reduced-Round KeccakLecture Notes in Computer Science, 2014
- Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFIDPublished by Springer Science and Business Media LLC ,2013
- A Differential Fault Attack on MICKEY 2.0Lecture Notes in Computer Science, 2013
- A Differential Fault Attack on the Grain Family of Stream CiphersLecture Notes in Computer Science, 2012
- Practical Analysis of Reduced-Round KeccakLecture Notes in Computer Science, 2011
- Differential Fault Analysis on CLEFIALecture Notes in Computer Science, 2007
- A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KhazadLecture Notes in Computer Science, 2003
- Differential fault analysis of secret key cryptosystemsLecture Notes in Computer Science, 1997