Attacking an Obfuscated Cipher by Injecting Faults
- 1 January 2003
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- A White-Box DES Implementation for DRM ApplicationsLecture Notes in Computer Science, 2003
- WWWUbiquity, 2002
- Differential Power AnalysisLecture Notes in Computer Science, 1999
- Playing ‘Hide and Seek’ with Stored KeysLecture Notes in Computer Science, 1999
- Low cost attacks on tamper resistant devicesLecture Notes in Computer Science, 1998
- On the Importance of Checking Cryptographic Protocols for FaultsLecture Notes in Computer Science, 1997
- Differential fault analysis of secret key cryptosystemsLecture Notes in Computer Science, 1997
- Tamper resistant software: an implementationLecture Notes in Computer Science, 1996
- Transaction Security SystemIBM Systems Journal, 1991
- New directions in cryptographyIEEE Transactions on Information Theory, 1976