Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Image from Google Jackets

Fault analysis in cryptography / [edited by] Marc Joye and Michael Tunstall.

Contributor(s): Material type: TextTextSeries: Information security and cryptographyPublication details: Berlin : Springer-Verlag, 2012.Description: xvi, 354 p. : illustrations (some color) ; 24 cmISBN:
  • 9783642296550
Subject(s): DDC classification:
  • 005.82 23 J89
Contents:
Part I - Introductory Material.- Chap. 1 Side-Channel Analysis and Its Relevance to Fault Attacks.- Part II Fault Analysis in Secret Key Cryptography.- Chap. 2 Attacking Block Ciphers.- Chap. 3 Differential Fault Analysis of DES.- Chap. 4 Differential Fault Analysis of the Advanced Encryption Standard.- Chap. 5 Countermeasures for Symmetric-Key Ciphers.- Chap. 6 On Countermeasures Against Fault Attacks on Advanced Encryption Standard.- Part III Fault Analysis in Public Key Cryptography.- Chap. 7 A Survey of Differential Fault Analysis Against Classical RSA Implementations.- Chap. 8 Fault Attacks Against RSA-CRT Implementation.- Chap. 9 Fault Attacks on Elliptic Curve Cryptosystems .- Chap. 10 On Countermeasures Against Fault Attacks on Elliptic Curve Cryptography Using Fault Detection.- Chap. 11 Design of Cryptographic Devices Resilient to Fault Injection Attacks Using Nonlinear Robust Codes.- Chap. 12 Lattice-Based Fault Attacks on Signatures.- Chap. 13 Fault Attacks on Pairing Based Cryptography.- Part IV Miscellaneous.- Chap. 14 Fault Attacks on Stream Ciphers.- Chap. 15 Interaction Between Fault Attack Countermeasures and the Resistance Against Power Analysis Attacks.- Part V Implementing Fault Attacks.- Chap. 16 Injection Technologies for Fault Attacks on Microprocessors.- Chap. 17 Global Faults on Cryptographic Circuits.- Chap. 18 Fault Injection and Key Retrieval Experiments on an Evaluation Board.- References.
Summary: This book covers fault analysis in secret key cryptography, from side-channel analysis and its relevance to fault attacks, to block ciphers, countermeasures against AES, attack-resistent devices, fault attacks on stream ciphers and fault injection experiments.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books ISI Library, Kolkata 005.82 J89 (Browse shelf(Opens below)) Available 136134
Total holds: 0

Includes bibliographical references.

Part I - Introductory Material.-
Chap. 1 Side-Channel Analysis and Its Relevance to Fault Attacks.-

Part II Fault Analysis in Secret Key Cryptography.-
Chap. 2 Attacking Block Ciphers.-
Chap. 3 Differential Fault Analysis of DES.-
Chap. 4 Differential Fault Analysis of the Advanced Encryption Standard.-
Chap. 5 Countermeasures for Symmetric-Key Ciphers.-
Chap. 6 On Countermeasures Against Fault Attacks on Advanced Encryption Standard.-

Part III Fault Analysis in Public Key Cryptography.-
Chap. 7 A Survey of Differential Fault Analysis Against Classical RSA Implementations.-
Chap. 8 Fault Attacks Against RSA-CRT Implementation.- Chap. 9 Fault Attacks on Elliptic Curve Cryptosystems .-
Chap. 10 On Countermeasures Against Fault Attacks on Elliptic Curve Cryptography Using Fault Detection.-
Chap. 11 Design of Cryptographic Devices Resilient to Fault Injection Attacks Using Nonlinear Robust Codes.-
Chap. 12 Lattice-Based Fault Attacks on Signatures.-
Chap. 13 Fault Attacks on Pairing Based Cryptography.-

Part IV Miscellaneous.-
Chap. 14 Fault Attacks on Stream Ciphers.-
Chap. 15 Interaction Between Fault Attack Countermeasures and the Resistance Against Power Analysis Attacks.-

Part V Implementing Fault Attacks.-
Chap. 16 Injection Technologies for Fault Attacks on Microprocessors.-
Chap. 17 Global Faults on Cryptographic Circuits.-
Chap. 18 Fault Injection and Key Retrieval Experiments on an Evaluation Board.-
References.

This book covers fault analysis in secret key cryptography, from side-channel analysis and its relevance to fault attacks, to block ciphers, countermeasures against AES, attack-resistent devices, fault attacks on stream ciphers and fault injection experiments.

There are no comments on this title.

to post a comment.
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in