Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks
Side channel analysis and fault attacks are two powerful methods to analyze and break cryptographic implementations. At CHES 2011, Roche and Prouff applied secure multiparty computation to prevent side-channel attacks. While multiparty computation is known to be fault-resistant as well, the particul...
Main Authors: | Okan Seker, Abraham Fernandez-Rubio, Thomas Eisenbarth, Rainer Steinwandt |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2018-08-01
|
Series: | Transactions on Cryptographic Hardware and Embedded Systems |
Subjects: | |
Online Access: | https://tches.iacr.org/index.php/TCHES/article/view/7281 |
Similar Items
-
StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations
by: Siemen Dhooghe, et al.
Published: (2023-12-01) -
Shaping the Glitch: Optimizing Voltage Fault Injection Attacks
by: Claudio Bozzato, et al.
Published: (2019-02-01) -
Dynamic Multiparty Quantum Secret Sharing With a Trusted Party Based on Generalized GHZ State
by: Ri-Gui Zhou, et al.
Published: (2021-01-01) -
Multiparty, relation with patology of pregnancy and delivery
by: L. Andrejevic, et al.
Published: (2020-02-01) -
Protecting against Statistical Ineffective Fault Attacks
by: Joan Daemen, et al.
Published: (2020-06-01)