Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
FDTC
FDTC 2016
Generate Citations
2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
Aug. 16 2016 to Aug. 16 2016
Santa Barbara, CA, USA
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-vi
Preface
Freely available from IEEE.
pp. vii-vii
Workshop Organization
Freely available from IEEE.
pp. viii-viii
Program Committee
Freely available from IEEE.
pp. ix-ix
Additional Reviewers
Freely available from IEEE.
pp. x-x
Acknowledgments
Freely available from IEEE.
pp. xi-xi
Attacks on Encrypted Memory and Constructions for Memory Protection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Shay Gueron
Differential Fault Analysis of SHA3-224 and SHA3-256
Full-text access may be available. Sign in or learn about subscription options.
pp. 4-15
by
Pei Luo
,
Yunsi Fei
,
Liwei Zhang
,
A. Adam Ding
Improved Fault Analysis on SIMON Block Cipher Family
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-24
by
Hua Chen
,
Jingyi Feng
,
Vincent Rijmen
,
Yunwen Liu
,
Limin Fan
,
Wei Li
Controlling PC on ARM Using Fault Injection
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-35
by
Niek Timmers
,
Albert Spruyt
,
Marc Witteman
Attack on a DFA Protected AES by Simultaneous Laser Fault Injections
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-46
by
Bodo Selmke
,
Johann Heyszl
,
Georg Sigl
Software Fault Resistance is Futile: Effective Single-Glitch Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-58
by
Bilgiday Yuce
,
Nahid Farhady Ghalaty
,
Harika Santapuri
,
Chinmay Deshpande
,
Conor Patrick
,
Patrick Schaumont
Continuous-Time Computational Aspects of Cyber-Physical Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-62
by
Sam Green
,
İhsan Çiçek
,
Çetin Kaya Koç
Lattice-Based Signature Schemes and Their Sensitivity to Fault Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-77
by
Nina Bindel
,
Johannes Buchmann
,
Juliane Krämer
An Embedded Digital Sensor against EM and BB Fault Injection
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-86
by
David El-Baze
,
Jean-Baptiste Rigaud
,
Philippe Maurine
Fault Tolerant Implementations of Delay-Based Physically Unclonable Functions on FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-101
by
Durga Prasad Sahoo
,
Sikhar Patranabis
,
Debdeep Mukhopadhyay
,
Rajat Subhra Chakraborty
Ring Oscillator under Laser: Potential of PLL-based Countermeasure against Laser Fault Injection
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-113
by
Wei He
,
Jakub Breier
,
Shivam Bhasin
,
Noriyuki Miura
,
Makoto Nagata
More Efficient Private Circuits II through Threshold Implementations
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-124
by
Thomas de Cnudde
,
Svetla Nikova
Author Index
Freely available from IEEE.
pp. 125-125
Publisher's Information
Freely available from IEEE.
pp. 126-126
Showing 23 out of 23