Today's article comes from IACR Transactions on Cryptographic Hardware and Embedded Systems. The authors are Uhle et al., from Ruhr University Bochum, in Germany. In this paper, they try to figure out how to evaluate the security of cryptographic hardware against fault injection attacks.
DOI: 10.46586/tches.v2025.i4.215-253
You must be an active Journal Club member to access this content. If you're already a member, click the blue button to login. If you're not a member yet, click the sign-up button to get started.
Login to My Account
Sign Up