Buffer overflow attack with multiple fault injection and a proven countermeasure (English)
- New search for: Nashimoto, Shoei
- New search for: Homma, Naofumi
- New search for: Hayashi, Yu-ichi
- New search for: Takahashi, Junko
- New search for: Fuji, Hitoshi
- New search for: Aoki, Takafumi
- New search for: Nashimoto, Shoei
- New search for: Homma, Naofumi
- New search for: Hayashi, Yu-ichi
- New search for: Takahashi, Junko
- New search for: Fuji, Hitoshi
- New search for: Aoki, Takafumi
In:
Journal of cryptographic engineering
;
7
, 1
; 35-46
;
2017
-
ISSN:
- Article (Journal) / Print
-
Title:Buffer overflow attack with multiple fault injection and a proven countermeasure
-
Contributors:Nashimoto, Shoei ( author ) / Homma, Naofumi ( author ) / Hayashi, Yu-ichi ( author ) / Takahashi, Junko ( author ) / Fuji, Hitoshi ( author ) / Aoki, Takafumi ( author )
-
Published in:Journal of cryptographic engineering ; 7, 1 ; 35-46
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin
-
Publication date:2017
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 005.8205
- Further information on Dewey Decimal Classification
- New search for: 54.38 / 54.62 / 54.38 / 54.62
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
Table of contents – Volume 7, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Mutual information analysis: higher-order statistical moments, efficiency and efficacyCarbone, Mathieu / Teglia, Yannick / Ducharme, Gilles R. / Maurine, Philippe et al. | 2016
- 19
-
Editorial about PROOFS 2015Guilley, Sylvain et al. | 2017
- 21
-
Trust can be misplacedIdrissi, Noreddine El Janati El / Bouffard, Guillaume / Lanet, Jean-Louis / Hajji, Said El et al. | 2016
- 35
-
Buffer overflow attack with multiple fault injection and a proven countermeasureNashimoto, Shoei / Homma, Naofumi / Hayashi, Yu-ichi / Takahashi, Junko / Fuji, Hitoshi / Aoki, Takafumi et al. | 2016
- 47
-
Smart security management in secure devicesRobisson, Bruno / Agoyan, Michel / Soquet, Patrick / Le-Henaff, Sébastien / Wajsbürt, Franck / Bazargan-Sabet, Pirouz / Phan, Guillaume et al. | 2016
- 63
-
SMASHUP: a toolchain for unified verification of hardware/software co-designsLugou, Florian / Apvrille, Ludovic / Francillon, Aurélien et al. | 2016
- 75
-
Using linear codes as a fault countermeasure for nonlinear operations: application to AES and formal verificationAzzi, Sabine / Barras, Bruno / Christofi, Maria / Vigilant, David et al. | 2016
- 87
-
Multi-level formal verificationSauvage, Laurent / Graba, Tarik / Porteboeuf, Thibault et al. | 2016