On Protecting Cryptographic Applications Against Fault Attacks Using Residue Codes.
Kazim YumbulSerdar Süer ErdemErkay SavasPublished in: FDTC (2011)
Keyphrases
- security protocols
- differential power analysis
- fault injection
- smart card
- cryptographic protocols
- cryptographic algorithms
- java card
- advanced encryption standard
- fault model
- stream cipher
- fault detection
- fault diagnosis
- protection mechanisms
- security mechanisms
- power analysis
- countermeasures
- block cipher
- key management
- access control
- watermarking scheme
- security properties
- error correction
- privacy preservation
- error detection
- unauthorized access
- hash functions
- secret key
- error correcting codes
- security risks
- digital signature
- malicious users