@article{DA_2024_31_2_a5,
author = {Yu. A. Zuev and P. G. Klyucharev},
title = {A~method for optimal value measurement of~some~parameters of~fault~attacks on~cryptographic algorithms},
journal = {Diskretnyj analiz i issledovanie operacij},
pages = {96--107},
year = {2024},
volume = {31},
number = {2},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/DA_2024_31_2_a5/}
}
TY - JOUR AU - Yu. A. Zuev AU - P. G. Klyucharev TI - A method for optimal value measurement of some parameters of fault attacks on cryptographic algorithms JO - Diskretnyj analiz i issledovanie operacij PY - 2024 SP - 96 EP - 107 VL - 31 IS - 2 UR - http://geodesic.mathdoc.fr/item/DA_2024_31_2_a5/ LA - ru ID - DA_2024_31_2_a5 ER -
%0 Journal Article %A Yu. A. Zuev %A P. G. Klyucharev %T A method for optimal value measurement of some parameters of fault attacks on cryptographic algorithms %J Diskretnyj analiz i issledovanie operacij %D 2024 %P 96-107 %V 31 %N 2 %U http://geodesic.mathdoc.fr/item/DA_2024_31_2_a5/ %G ru %F DA_2024_31_2_a5
Yu. A. Zuev; P. G. Klyucharev. A method for optimal value measurement of some parameters of fault attacks on cryptographic algorithms. Diskretnyj analiz i issledovanie operacij, Tome 31 (2024) no. 2, pp. 96-107. http://geodesic.mathdoc.fr/item/DA_2024_31_2_a5/
[1] Baksi A., Bhasin S., Breier J., Jap D., Saha D., “A survey on fault attacks on symmetric key cryptosystems”, ACM Comput. Surveys, 55:4 (2022), 86, 34 pp. | MR
[2] Breier J., Jap D., “A survey of the state-of-the-art fault attacks”, Proc. 14th Int. Symp. Integrated Circuits (Singapore, Dec. 10–12, 2014), IEEE, Piscataway, 2014, 152–155
[3] Giraud C., Thiebeauld H., “A survey on fault attacks”, Smart card research and advanced applications VI, IFIP 18th World Computer Congress. TC8/WG8.8 TC11/WG11.2 6th Int. Conf. (Toulouse, France, Aug. 22–27, 2004), Kluwer Acad. Publ., New York, 2004, 159–176
[4] Kim C. H., Quisquater J.-J., “Faults, injection methods, and fault attacks”, IEEE Des. Test Comput., 24:6 (2007), 544–545 | DOI
[5] Gangolli A., Mahmoud Q. H., Azim A., “A systematic review of fault injection attacks on IoT systems”, Electronics, 11:13 (2022), 2023, 24 pp. | DOI
[6] Piscitelli R., Bhasin S., Regazzoni F., “Fault attacks, injection techniques and tools for simulation”, Hardware security and trust. Design and deployment of integrated circuits in a threatened environment, Springer, Cham, 2017, 27–47
[7] Shepherd C., Markantonakis K., van Heijningen N., Aboulkassimi D., Gaine C., Heckmann T., Naccache D., “Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis”, Comput. Secur., 111 (2021), 102471, 31 pp. | DOI
[8] R. Bellman, Dynamic Programming, Princeton Univ. Press, Princeton, NJ, 1957 | MR | MR | Zbl
[9] Dreyfus S., The art and theory of dynamic programming, Math. Sci. Eng., 130, Acad. Press, New York, 1977, 284 pp. | MR | Zbl
[10] Lew A., Mauch H., Dynamic programming: A computational tool, Springer, Heidelberg, 2010, 379 pp.
[11] Cormen T. H., Leiserson C. E., Rivest R. L., Stein C., Introduction to algorithms, MIT Press, Cambridge, MA, 2022, 1312 pp. | MR | Zbl