Table Redundancy Method for Protecting Against Fault Attacks

Fault attacks (FA) intentionally inject some fault into the encryption process for analyzing a secret key based on faulty intermediate values or faulty ciphertexts. One of the easy ways for software-based countermeasures is to use time redundancy. However, existing methods can be broken by skipping...

Full description

Bibliographic Details
Main Authors: Seungkwang Lee, Nam-Su Jho, Myungchul Kim
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9465147/