2023
DOI: 10.1049/ise2.12121
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting statistical effective fault attack in a blind setting

Abstract: In order to obtain the secret key, the majority of physical attacks require knowledge of the plaintext or ciphertext, which may be unavailable or cannot be exploited. Blind attacks are introduced to do key recovery in circumstances where the adversary has no direct access to plaintext and ciphertext. A combination of fault and power attacks can circumvent typical countermeasures in this setting, for example, Fault Template Attack (FTA). However, FTA relies on bit fault injection, which is difficult to implemen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 25 publications
(48 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?