Fault analysis in cryptography / [edited by] Marc Joye and Michael Tunstall.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 9783642296550
- 005.82 23 J89
Item type | Current library | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|
Books | ISI Library, Kolkata | 005.82 J89 (Browse shelf(Opens below)) | Available | 136134 |
Includes bibliographical references.
Part I - Introductory Material.-
Chap. 1 Side-Channel Analysis and Its Relevance to Fault Attacks.-
Part II Fault Analysis in Secret Key Cryptography.-
Chap. 2 Attacking Block Ciphers.-
Chap. 3 Differential Fault Analysis of DES.-
Chap. 4 Differential Fault Analysis of the Advanced Encryption Standard.-
Chap. 5 Countermeasures for Symmetric-Key Ciphers.-
Chap. 6 On Countermeasures Against Fault Attacks on Advanced Encryption Standard.-
Part III Fault Analysis in Public Key Cryptography.-
Chap. 7 A Survey of Differential Fault Analysis Against Classical RSA Implementations.-
Chap. 8 Fault Attacks Against RSA-CRT Implementation.- Chap. 9 Fault Attacks on Elliptic Curve Cryptosystems .-
Chap. 10 On Countermeasures Against Fault Attacks on Elliptic Curve Cryptography Using Fault Detection.-
Chap. 11 Design of Cryptographic Devices Resilient to Fault Injection Attacks Using Nonlinear Robust Codes.-
Chap. 12 Lattice-Based Fault Attacks on Signatures.-
Chap. 13 Fault Attacks on Pairing Based Cryptography.-
Part IV Miscellaneous.-
Chap. 14 Fault Attacks on Stream Ciphers.-
Chap. 15 Interaction Between Fault Attack Countermeasures and the Resistance Against Power Analysis Attacks.-
Part V Implementing Fault Attacks.-
Chap. 16 Injection Technologies for Fault Attacks on Microprocessors.-
Chap. 17 Global Faults on Cryptographic Circuits.-
Chap. 18 Fault Injection and Key Retrieval Experiments on an Evaluation Board.-
References.
This book covers fault analysis in secret key cryptography, from side-channel analysis and its relevance to fault attacks, to block ciphers, countermeasures against AES, attack-resistent devices, fault attacks on stream ciphers and fault injection experiments.
There are no comments on this title.