References

The References used for creating this blog, I am very thankful to all the people who had created this state of art works with their deep knowledge in the subject.

  1. C. Aumuller et al. “Fault attacks on RSA with CRT: Concrete results and practical countermeasures”. In:Lecture Notes in Computer Science (2003), pp. 260–275.
  2. G. Barbu, H. Thiebeauld, and V. Guerin. “Attacks on Java Card 3.0 Combining Fault and Logical Attacks”. In:Smart Card Research and Advanced Application, Cardis 2010 LNCS 6035 (2010), pp. 148–163.
  3. G. Bizzotto and G. Grimaud. “Practical Java Card bytecode compression”. In: Proceedings of RENPAR14/ASF/SYMPA. Citeseer. 2002.
  4. J. Blomer, M. Otto, and J.P. Seifert. “A new CRT-RSA algorithm secure against Bellcore attacks”. In: Proceedings of the 10th ACM conference on Computer and communications security. ACM New York, NY,USA. 2003, pp. 311–320.
  5. L.R. Clausen et al. “Java bytecode compression for low-end embedded systems”. In: ACM Transactions on Programming Languages and Systems (TOPLAS) 22.3 (2000), p. 489. Global platform group. Global platform official site. 2010. url:http://www.globalplatform.org.
  6. L. Hemme. “A differential fault attack against early rounds of (triple) DES”. In: Cryptographic Hardware and Embedded Systems-CHES 2004 (2004), pp. 170–217.
  7. J. Iguchi-Cartigny and J.L. Lanet. “Developing a Trojan applets in a smart card”. In: Journal in Computer Virology (2009), pp. 1–9.
  8. Sun Mycrosystems. Java CardTM 3.0.1 Specification. Sun Microsystems. 2009.
  9. G. Piret and J.J. Quisquater. “A differential fault attack technique against SPN structures, with application to the AES and Khazad”. In: Cryptographic Hardware and Embedded Systems-CHES 2003 (2003), pp. 77–88.
  10. A.A. Sere, J. Iguchi-Cartigny, and J.L. Lanet. “Automatic detection of fault attack and countermeasures”. In:Proceedings of the 4th workshop on Embedded Systems Security. ACM. 2009, pp. 1–7.
  11. A.A. Sere, J. Iguchi-Cartigny, and J.L. Lanet. “Mutant applications in smart card”. In: Proceedings of CIS 2010 (2010).
  12. E. Vetillard and A. Ferrari. “Combined Attacks and Countermeasures”. In: Smart Card Research and Advanced Application, Cardis 2010 LNCS 6035 (2010), pp. 133–147.
  13. D. Wagner. “Cryptanalysis of a provably secure CRT-RSA algorithm”. In: Proceedings of the 11th ACM conference on Computer and communications security. ACM New York, NY, USA. 2004, pp. 92–97.
  14. Ahmadou Al Khary Sere ,Julien Iguchi-Cartigny and Jean-Louis Lanet. “Automatic detection of fault attack and countermeasures”
  15. Ahmadou Al Khary Sere ,Julien Iguchi-Cartigny and Jean-Louis Lanet. “Evaluation of Countermeasures Against Fault Attacks on Smart Cards”
  16. Wojciech Mostowski and Erik Poll.”Malicious Code on Java Card Smartcards:Attacks and Countermeasures”
  17. M.L. Akkar, L. Goubin, and O. Ly. Automatic Integration of Counter-Measures Against Fault Injection Attacks. Pre-print found at http://www. labri. fr/Perso/ly/index. htm, 2003.
  18. R.J. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. Lecture notes in computer science, pages 125–136, 1998.
  19. C. Aumuller, P. Bier, W. Fischer, P. Hofreiter, and J.P. Seifert.Fault attacks on RSA with CRT: Concrete results and practical countermeasures. Lecture Notes in Computer Science, pages 260–275, 2003.
  20. H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan, D.T.Ltd, and I. Rehovot. The sorcerer’s apprentice guide to fault attacks.Proceedings of the IEEE, 94(2):370–382, 2006.
  21. E. Biham and A. Shamir. Differential fault analysis of secret key cryptosystems. Lecture Notes in Computer Science, 1294:513–525,1997.
  22. J. Blomer, M. Otto, and J.P. Seifert. A new CRT-RSA algorithm secure against Bellcore attacks. In Proceedings of the 10th ACM conference on Computer and communications security, pages 311–320. ACM New York, NY, USA, 2003.
  23. D. Boneh, R.A. DeMillo, and R.J. Lipton. On the importance of checking cryptographic protocols for faults. Lecture Notes in Computer Science, 1233:37–51, 1997.
  24. KO GADELLAA. Fault Attacks on Java Card (Masters Thesis).Universidade de Eindhoven, 2005.
  25. O. Kommerling, M. Kuhn, and P. Street. Design principles for tamper-resistant smartcard processors.
  26. J.J. Quisquater and D. Samyde. Eddy current for magnetic analysis with active sensor. In Proceedings of Esmart, volume 2002, 2002.
  27. S.P. Skorobogatov and R.J. Anderson. Optical fault induction attacks.Lecture notes in computer science, pages 2–12, 2003.
  28. D. Wagner. Cryptanalysis of a provably secure CRT-RSA algorithm.In Proceedings of the 11th ACM conference on Computer and communications security, pages 92–97. ACM New York, NY, USA,2004.