2003
DOI: 10.1016/s0026-2692(02)00126-x
|View full text |Cite
|
Sign up to set email alerts
|

Concurrent error detection of fault-based side-channel cryptanalysis of 128-bit RC6 block cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…In general, most fault-tolerant design techniques, such as temporal and spatial redundancy, can be applied to mitigate certain types of faults. These techniques include Concurrent Error Detection (CED) [121][122][123][124][125][126][127][128][129][130], error detection/correction code [131][132][133][134][135][136][137][138][139][140][141][142][143], modular redundancy [144,145], Built-In Self-Test (BIST) [146], and algorithm modification [147][148][149][150][151][152][153]. In addition, the use of dual-rail encoding and its fault analysis can be found in [130,[154][155][156].…”
Section: Fault-based Attacksmentioning
confidence: 99%
“…In general, most fault-tolerant design techniques, such as temporal and spatial redundancy, can be applied to mitigate certain types of faults. These techniques include Concurrent Error Detection (CED) [121][122][123][124][125][126][127][128][129][130], error detection/correction code [131][132][133][134][135][136][137][138][139][140][141][142][143], modular redundancy [144,145], Built-In Self-Test (BIST) [146], and algorithm modification [147][148][149][150][151][152][153]. In addition, the use of dual-rail encoding and its fault analysis can be found in [130,[154][155][156].…”
Section: Fault-based Attacksmentioning
confidence: 99%
“…On the other hand, several countermeasures that detect errors in processing have also been proposed [14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29]. Fig.…”
Section: Introductionmentioning
confidence: 99%
“…1(b), two encryption operations for the same data in the register RegX are performed by duplicated round function blocks, and the results are compared [24]. The architecture of Fig.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation