Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007) 2007
DOI: 10.1109/fdtc.2007.12
|View full text |Cite
|
Sign up to set email alerts
|

Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0
1

Year Published

2009
2009
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 59 publications
(33 citation statements)
references
References 22 publications
0
32
0
1
Order By: Relevance
“…The first combined attack technique was reported by Amiel et al in [80]. In this work, the authors showed that it is possible to attack an RSA exponentiation that was protected against power analysis attacks using a balanced algorithm with message randomization, by inducing ad-hoc faults.…”
Section: Power and Fault Attacks Synergiesmentioning
confidence: 96%
“…The first combined attack technique was reported by Amiel et al in [80]. In this work, the authors showed that it is possible to attack an RSA exponentiation that was protected against power analysis attacks using a balanced algorithm with message randomization, by inducing ad-hoc faults.…”
Section: Power and Fault Attacks Synergiesmentioning
confidence: 96%
“…Left-to-right atomic exponentiation algorithms seems particularly vulnerable to combined attacks [3,16]. In left-to-right algorithms, the value of one register, e.g.…”
Section: Efficiency and Security Evaluationmentioning
confidence: 99%
“…Our solution also allows dynamic randomization inside the exponentiation algorithm whereas other classical countermeasures often use only one randomization at the beginning of the exponentiation algorithm. This property can be useful in order to have a protection against the attack of Amiel et al in [1] or even combined attacks as presented in [3].…”
Section: Introductionmentioning
confidence: 99%
“…They can be categorized into two types: passive attacks and active attacks [15]. Passive attacks are based on the observation of side-channel information such as the power consumption of the chip or its electromagnetic emanations.…”
Section: Types Of Attacksmentioning
confidence: 99%