Differential behavioral analysis

30Citations
Citations of this article
53Readers
Mendeley users who have this article in their library.

Abstract

This paper describes an attack on cryptographic devices called Differential Behavioral Analysis (or DBA). This is an hybrid attack between two already powerful attacks: differential power analysis (DPA) for the statistical treatment and safe-error attack for the fault type. DBA, simulated on an algorithmic model of AES appears to be very efficient. The attacker is able to recover the entire secret key with byte-wise "stuck-at" faults injected repetitively. A theorical as well as a more realistic approach are presented. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Robisson, B., & Manet, P. (2007). Differential behavioral analysis. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4727 LNCS, pp. 413–426). Springer Verlag. https://doi.org/10.1007/978-3-540-74735-2_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free