2011
DOI: 10.1587/transfun.e94.a.855
|View full text |Cite
|
Sign up to set email alerts
|

A Fault Analytic Method against HB+

Abstract: Abstract-The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem has been proposed: the so-called HB-family. Despite the rich literature regarding the cryptanalysis of these protocols, there are no published results about the impact of fault analysis over them. The purpose of this paper is to fill this gap by presenting a fault analytic method against a prominent memb… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…This attack carried out while computation transferring is carried out by means of bus or in the register or reminiscence [52], [58], [59].…”
Section: B Data Processing Part Attackmentioning
confidence: 99%
“…This attack carried out while computation transferring is carried out by means of bus or in the register or reminiscence [52], [58], [59].…”
Section: B Data Processing Part Attackmentioning
confidence: 99%
“…Attacks on data processing part. A device can be disturbed while performing a computation, which will cause an erroneous intermediate or final result [22], [23], [24], [25], [1], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36]. Note that the same effect can be caused if a fault is injected while the result is transferred via a bus, or even when it is stored in registers/memory.…”
Section: Fault Targetsmentioning
confidence: 99%
“…For example, a parity check of an addition or a multiplication. [27], [4], [3], [44], [11] [12], [21], [36], [39], [8], [23], [41], [42], [48], [28], [5], [24], [7], [17], [38], [43] [41], [42], [38], [43] Fault Model Bit Wise Word Wise Variable Wise [39], [9], [2], [5], [36], [12], [21], [8], [23] [4], [3], [47] [51], [25], [27], [44], [11], [48], [28], [24], [49], [7], [17] Abstraction Level…”
Section: Classification Of Countermeasuresmentioning
confidence: 99%