265 papers found
Refreshing results…
Introduction to Fault Attacks
Side-Channel Inspired Fault Analysis Techniques
Advanced Fault Attacks in Software: Exploiting the Rowhammer Bug
Side-Channel Assisted Fault Analysis
Classical Fault Attacks on Public and Symmetric-Key Cryptosystems
Differential Fault Attack on SKINNY Block Cipher
Rapid detection of rowhammer attacks using dynamic skewed hash tree
Classical Countermeasures Against Differential Fault Analysis
Automatic Characterization of Exploitable Faults: A Machine Learning Approach
Building PUF based Authentication and Key Exchange Protocol for IoT without Explicit CRPs in Verifier Database
A Combined Power and Fault Analysis Attack on Protected Grain Family of Stream Ciphers
Two Efficient Fault-Based Attacks on CLOC and SILC
An Evaluation of Lightweight Block Ciphers for Resource-Constrained Applications: Area, Performance, and Security
A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers
Editorial for the Special Issue in Journal of Hardware and Systems Security (HaSS) Based on Selected Papers from 6th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2016)
Side Channel Evaluation of PUF-Based Pseudorandom Permutation
Opening pandora's box: Implication of RLUT on secure FPGA applications and IP security
Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications
Formal fault analysis of branch predictors: attacking countermeasures of asymmetric key ciphers
Missing publications? Read more about our data sources.