The sorcerer's apprentice guide to fault attacks H Bar-El, H Choukri, D Naccache, M Tunstall, C Whelan Proceedings of the IEEE 94 (2), 370-382, 2006 | 1212 | 2006 |
Differential fault analysis of the advanced encryption standard using a single fault M Tunstall, D Mukhopadhyay, S Ali Information Security Theory and Practice. Security and Privacy of Mobile …, 2011 | 448 | 2011 |
Fault analysis in cryptography M Joye, M Tunstall Springer, 2012 | 262 | 2012 |
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip J Longo, E De Mulder, D Page, M Tunstall Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015 | 181 | 2015 |
Round reduction using faults H Choukri, M Tunstall FDTC 5, 13-24, 2005 | 137 | 2005 |
Infective computation and dummy rounds: Fault protection for block ciphers without check-before-output B Gierlichs, JM Schmidt, M Tunstall Progress in Cryptology–LATINCRYPT 2012: 2nd International Conference on …, 2012 | 118 | 2012 |
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 113 | 2006 |
Experimenting with Faults, Lattices and the DSA D Naccache, P Nguyên, M Tunstall, C Whelan Public Key Cryptography-PKC 2005, 16-28, 2005 | 113 | 2005 |
Compiler Assisted Masking A Moss, E Oswald, D Page, M Tunstall Cryptographic Hardware and Embedded Systems–CHES 2012, 58-75, 2012 | 109 | 2012 |
Exponent recoding and regular exponentiation algorithms M Joye, M Tunstall Progress in Cryptology–AFRICACRYPT 2009: Second International Conference on …, 2009 | 92 | 2009 |
Differential power analysis of HMAC based on SHA-2, and countermeasures R McEvoy, M Tunstall, CC Murphy, WP Marnane Information Security Applications: 8th International Workshop, WISA 2007 …, 2007 | 89 | 2007 |
Online template attacks L Batina, Ł Chmielewski, L Papachristodoulou, P Schwabe, M Tunstall Journal of Cryptographic Engineering 9, 21-36, 2019 | 86 | 2019 |
Attacking smart card systems: Theory and practice K Markantonakis, M Tunstall, G Hancke, I Askoxylakis, K Mayes information security technical report 14 (2), 46-56, 2009 | 83 | 2009 |
Side-channel analysis of cryptographic software via early-terminating multiplications J Großschädl, E Oswald, D Page, M Tunstall Information, Security and Cryptology–ICISC 2009: 12th International …, 2010 | 82 | 2010 |
Efficient use of random delays in embedded software M Tunstall, O Benoit Information Security Theory and Practices. Smart Cards, Mobile and …, 2007 | 71 | 2007 |
Differential fault analysis of AES: towards reaching its limits SS Ali, D Mukhopadhyay, M Tunstall Journal of Cryptographic Engineering 3, 73-97, 2013 | 65 | 2013 |
Fault analysis of DPA-resistant algorithms F Amiel, C Clavier, M Tunstall International Workshop on Fault Diagnosis and Tolerance in Cryptography, 223-236, 2006 | 63 | 2006 |
Exploiting collisions in addition chain-based exponentiation algorithms using a single trace N Hanley, HS Kim, M Tunstall Topics in Cryptology–-CT-RSA 2015: The Cryptographer's Track at the RSA …, 2015 | 62 | 2015 |
Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems R Avanzi, S Hoerder, D Page, M Tunstall Journal of Cryptographic Engineering 1, 271-281, 2011 | 62 | 2011 |
Isolated WDDL: A hiding countermeasure for differential power analysis on FPGAs RP McEvoy, CC Murphy, WP Marnane, M Tunstall ACM Transactions on Reconfigurable Technology and Systems (TRETS) 2 (1), 1-23, 2009 | 60 | 2009 |