Abstract is missing.
- The Fault Attack Jungle - A Classification Model to Guide YouIngrid Verbauwhede, Dusko Karaklajic, Jörn-Marc Schmidt. 3-8 [doi]
- Fault Sensitivity Analysis Against Elliptic Curve CryptosystemsHikaru Sakamoto, Yang Li, Kazuo Ohta, Kazuo Sakiyama. 11-20 [doi]
- A Cost-Effective FPGA-based Fault Simulation EnvironmentAngelika Janning, Johann Heyszl, Frederic Stumpf, Georg Sigl. 21-31 [doi]
- A Differential Fault Analysis on AES Key Schedule Using Single FaultSubidh Ali, Debdeep Mukhopadhyay. 35-42 [doi]
- From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks on Key ExpansionNoémie Floissac, Yann L'Hyver. 43-53 [doi]
- Differential Fault Analysis on the SHA1 Compression FunctionLudger Hemme, Lars Hoffmann. 54-62 [doi]
- Fault Injection, A Fast Moving Target in EvaluationsRob Bekkers, Hans König. 65 [doi]
- On Protecting Cryptographic Applications Against Fault Attacks Using Residue CodesKazim Yumbul, Serdar Süer Erdem, Erkay Savas. 69-79 [doi]
- A High-Performance Fault Diagnosis Approach for the AES SubBytes Utilizing Mixed BasesMehran Mozaffari Kermani, Arash Reyhani-Masoleh. 80-87 [doi]
- Practical Optical Fault Injection on Secure MicrocontrollersJasper G. J. van Woudenberg, Marc F. Witteman, Federico Menarini. 91-99 [doi]
- Local and Direct EM Injection of Power Into CMOS Integrated CircuitsFrançois Poucheret, Karim Tobich, Mathieu Lisart, Laurent Chusseau, Bruno Robisson, Philippe Maurine. 100-104 [doi]
- An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUsJosep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede. 105-114 [doi]