نتایج جستجو برای: Differential Fault Analysis

تعداد نتایج: 3091401  

In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new features to the proposed attacks, e.g., the high probability of fault detection and the possibility of re-checking initial faults and the possibility to recover internal state...

This paper presents a method for diagnosis of eccentricity fault in a switched-reluctance motor (SRM) during offline and standstill modes. In this method, the fault signature is differential induced voltage (DIV) achieved by injecting diagnostic pulses to the motor windings. It will be demonstrated by means of results that there is a correlation between differential induced voltage and eccentri...

Journal: :journal of operation and automation in power engineering 2015
h nazari n. rostami

this paper presents a method for diagnosis of eccentricity fault in a switched-reluctance motor (srm) during offline and standstill modes. in this method, the fault signature is differential induced voltage (div) achieved by injecting diagnostic pulses to the motor windings. it will be demonstrated by means of results that there is a correlation between differential induced voltage and eccentri...

2012
Abdulaziz Alkhoraidly Agustin Dominguez-Oviedo M. Anwar Hasan

Journal: :IACR Cryptology ePrint Archive 2017
Martin Seysen

An implementation of a point multiplication function in an ellipticcurve cryptosystem can be attacked by fault injections in order to reveal the secret multiplier. A special kind of such an attack is the sign-change fault attack. Here the result of a point multiplication is changed in such a way that it is still a point on the curve. A well-known countermeasure against this kind of attack is to...

2013
Diana Maimut Cédric Murdica David Naccache Mehdi Tibouchi

2013
Ronan Lashermes Jacques J. A. Fournier Louis Goubin

The calculation of the Tate pairing on ordinary curves involves two major steps: the Miller Loop (ML) followed by the Final Exponentiation (FE). The rst step for achieving a full pairing inversion would be to invert this FE, which in itself is a mathematically di cult problem. To our best knowledge, most fault attack schemes proposed against pairing algorithms have mainly focussed on the ML. Th...

2008
Jörn-Marc Schmidt

This report presents the results of the Differential Fault Analysis (DFA) Project. The project was funded by Secure Business Austria (SBA) and A-SIT. Its objective was to perform basic steps in the field of fault injection. The effect of faults was investigated in theory as well as in practice. The first part of this report concentrates on theoretical fault models. New fault attacks on public k...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید