{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:53:02Z","timestamp":1764996782005,"version":"3.32.0"},"publisher-location":"Boston, MA","reference-count":31,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781402081460"},{"type":"electronic","value":"9781402081477"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8147-2_11","type":"book-chapter","created":{"date-parts":[[2006,2,20]],"date-time":"2006-02-20T16:57:38Z","timestamp":1140454658000},"page":"159-176","source":"Crossref","is-referenced-by-count":69,"title":["A Survey on Fault Attacks"],"prefix":"10.1007","author":[{"given":"Christophe","family":"Giraud","sequence":"first","affiliation":[]},{"given":"Hugues","family":"Thiebeauld","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"R. Anderson and M. Kuhn. Tamper Resistance-a Cautionary Note. In Proceedings of the 2 nd USENIX Workshop on Electronic Commerce, pages 1\u201311, 1996."},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"R. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. In B. Christianson, B. Crispo, T. Mark, A. Lomas, and M. Roe, editors, 5 th Security Protocols Workshop, volume 1361 of LNCS, pages 125\u2013136. Springer, 1997.","DOI":"10.1007\/BFb0028165"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"C. Aum\u00fcller, P. Bier, W. Fischer, P. Hofreiter, and J.-P. Seifert. Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures. In B. Kaliski Jr., \u00c7.K. Ko\u00e7, and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2002, volume 2523 of LNCS, pages 260\u2013275. Springer, 2002.","DOI":"10.1007\/3-540-36400-5_20"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"F. Bao, R. Deng, Y. Han, A. Jeng, A. D. Narasimhalu, and T.-H. Ngair. Breaking Public Key Cryptosystems an Tamper Resistance Devices in the Presence of Transient Fault. In 5 th Security Protocols Workshop, volume 1361 of LNCS, pages 115\u2013124. Springer-Verlag, 1997.","DOI":"10.1007\/BFb0028164"},{"key":"11_CR5","unstructured":"F. Beck. Integrated Circuit Failure Analysis-A Guide to Preparation Techniques. Wiley, 1998."},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"I. Biehl, B. Meyer, and V. M\u00fcller. Differential Fault Analysis on Elliptic Curve Cryptosystems. In M. Bellare, editor, Advances in Cryptology-CRYPTO 2000, volume 1880 of LNCS, pages 131\u2013146. Springer-Verlag, 2000.","DOI":"10.1007\/3-540-44598-6_8"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"E. Biham and A. Shamir. Differential Fault Analysis of Secret Key Cryptosystem. In B.S. Kalisky Jr., editor, Advances in Cryptology-CRYPTO\u2019 97, volume 1294 of LNCS, pages 513\u2013525. Springer-Verlag, 1997.","DOI":"10.1007\/BFb0052259"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"J. Bl\u00f6mer, M. Otto, and J.-P. Seifert. A New RSA-CRT Algorithm Secure Against Bellcore Attacks. In ACM-CCS\u201903. ACM Press, 2003.","DOI":"10.1145\/948109.948151"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"J. Bl\u00f6mer and J.-P. Seifert. Fault based cryptanalysis of the Advanced Encryption Standard. In R.N. Wright, editor, Financial Cryptography-FC 2003, volume 2742 of LNCS. Springer-Verlag, 2003.","DOI":"10.1007\/978-3-540-45126-6_12"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"D. Boneh, R.A. DeMillo, and R.J. Lipton. On the Importance of Checking Cryptographic Protocols for Faults. In W. Fumy, editor, Advances in Cryptology-EUROCRYPT\u2019 97, volume 1233 of LNCS, pages 37\u201351. Springer-Verlag, 1997.","DOI":"10.1007\/3-540-69053-0_4"},{"issue":"2","key":"11_CR11","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s001450010016","volume":"14","author":"D. Boneh","year":"2001","unstructured":"D. Boneh, R.A. DeMillo, and R.J. Lipton. On the Importance of Eliminating Errors in Cryptographic Computations. Journal of Cryptology, 14(2):101\u2013119, 2001. An earlier version was published at EUROCRYPT\u201997 [10].","journal-title":"Journal of Cryptology"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"C.-N. Chen and S.-M. Yen. Differential Fault Analysis on AES Key Schedule and Some Countermeasures. In R. Safavi-Naini and J. Seberry, editors, Information Security and Privacy-8th Australasian Conference-ACISP 2003, volume 2727 of LNCS, pages 118\u2013129. Springer-Verlag, 2003.","DOI":"10.1007\/3-540-45067-X_11"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"M. Ciet and M. Joye. Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults. In Designs, Codes and Cryptography, 2004. To appear.","DOI":"10.1007\/s10623-003-1160-8"},{"key":"11_CR14","unstructured":"E. Dottax. Fault Attacks on NESSIE Signature and Identification Schemes. Technical report, NESSIE, Available from https:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/reports\/phase2\/SideChan\\_1.pdf, October 2002."},{"key":"11_CR15","unstructured":"E. Dottax. Fault and chosen modulus attacks on some NESSIE asymetrique Primitives. Technical report, NESSIE, Available from https:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/reports\/phase2\/ChosenModAtt2.pdf, February 2003."},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"P. Dusart, G. Letourneux, and O. Vivolo. Differential Fault Analysis on A.E.S. Cryptology ePrint Archive, Report 2003\/010, 2003. http:\/\/eprint.iacr.org\/ .","DOI":"10.1007\/978-3-540-45203-4_23"},{"key":"11_CR17","unstructured":"C. Giraud. DFA on AES. Cryptology ePtint Archive, Report 2003\/008, 2003. http:\/\/eprint.iacr.org\/ ."},{"issue":"4","key":"11_CR18","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s001459900055","volume":"12","author":"M. Joye","year":"1999","unstructured":"M. Joye, A.K. Lenstra, and J.-J. Quisquater. Chinese Remaindering Based Cryptosystems in the Presence of Faults. Journal of Cryptology, 12(4):241\u2013246, 1999.","journal-title":"Journal of Cryptology"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"M. Joye, J.-J. Quisquater, F. Bao, and R.H. Deng. RSA-type Signatures in the Presence of Transient Faults. In M. Darnell, editor, Cryptography and Coding, volume 1355 of LNCS, pages 155\u2013160. Springer-Verlag, 1997.","DOI":"10.1007\/BFb0024460"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"M. Joye, J.-J. Quisquater, S.-M. Yen, and M. Yung. Observability Analysis-Detecting When Improved Cryptosystems Fail. In B. Preneel, editor, Topics in Cryptology-CT-RSA 2002, volume 2271 of LNCS, pages 17\u201329. Springer-Verlag, 2002.","DOI":"10.1007\/3-540-45760-7_2"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"V. Kl\u00edma and T. Rosa. Further Results and Considerations on Side Channel Attacks on RSA. In B. Kaliski Jr., \u00c7.K. Ko\u00e7, and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2002, volume 2523 of LNCS, pages 244\u2013259. Springer-Verlag, 2002.","DOI":"10.1007\/3-540-36400-5_19"},{"key":"11_CR22","unstructured":"A.K. Lenstra. Memo on RSA Signature Generation in the Presence of Faults. Manuscript, 1996. Available from the author at arjen.lenstra@citicorp.com."},{"key":"11_CR23","unstructured":"F. Koeune M. Joye and J.-J. Quisquater. Further results on Chinese remaindering. Technical Report CG-1997\/1, UCL, 1997. Available from http:\/\/www.dice.ucl.ac.be\/crypto\/techreports.html ."},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"D.P. Maher. Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective. In R. Hirschfeld, editor, Financial Cryptography-FC\u2019 97, volume 1318 of LNCS, pages 109\u2013121. Springer-Verlag, 1997.","DOI":"10.1007\/3-540-63594-7_71"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"G. Piret and J.-J. Quisquater. A Differential Fault Attack Technique Against SPN Structures, with Application to the AES and KHAZAD. In C.D. Walter, \u00c7.K. Ko\u00e7, and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2003, volume 2779 of LNCS, pages 77\u201388. Springer-Verlag, 2003.","DOI":"10.1007\/978-3-540-45238-6_7"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"D. Samyde, S. Skorobogatov, R. Anderson, and J.-J. Quisquater. On a New Way to Read Data from Memory. In First International IEEE Security in Storage Workshop, pages 65\u201369. IEEE Computer Society, 2002.","DOI":"10.1109\/SISW.2002.1183512"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"S. Skorobogatov and R. Anderson. Optical Fault Induction Attack. In B. Kaliski Jr., \u00c7.K. Ko\u00e7, and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2002, volume 2523 of LNCS, pages 2\u201312. Springer, 2002.","DOI":"10.1007\/3-540-36400-5_2"},{"key":"11_CR28","unstructured":"S.-M. Yen and J.Z. Chen. A DFA on Rijndael. In A.H. Chan and V. Gligor, editors, Information Security-ISC 2002, volume 2433 of LNCS. Springer, 2002."},{"issue":"9","key":"11_CR29","doi-asserted-by":"crossref","first-page":"967","DOI":"10.1109\/12.869328","volume":"49","author":"S.-M. Yen","year":"2000","unstructured":"S.-M. Yen and M. Joye. Checking before output may not be enough against fault-based cryptanalysis. IEEE Trans. on Computers, 49(9):967\u2013970, 2000.","journal-title":"IEEE Trans. on Computers"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"S.-M. Yen, S.-J. Kim, S.-G. Lim, and S.-J. Moon. A Countermeasure against one Physical Cryptanalysis May Benefit Another Attack. In K. Kim, editor, Information Security and Cryptology-ICISC 2001, volume 2288 of LNCS, pages 414\u2013427. Springer-Verlag, 2001.","DOI":"10.1007\/3-540-45861-1_31"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"S.-M. Yen, S.J. Moon, and J.-C. Ha. Permanent Fault Attack on RSA with CRT. In R. Safavi-Naini and J. Seberry, editors, Information Security and Privacy-8th Australasian Conference-ACISP 2003, volume 2727 of LNCS, pages 285\u2013296. Springer-Verlag, 2003.","DOI":"10.1007\/3-540-45067-X_25"}],"container-title":["IFIP International Federation for Information Processing","Smart Card Research and Advanced Applications VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8147-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T20:36:33Z","timestamp":1736282193000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8147-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781402081460","9781402081477"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8147-2_11","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2004]]}}}