Abstract
The advent of cloud computing and IoT have heralded an era of unprecedented levels of embedded technology and device connectivity across the globe. However, this raises concerns related to security and privacy. While one alleviate such concerns is to resort to the use of cryptographic modules for secure computation, cryptographic implementations themselves could be subjected to implementation attacks such as side-channel and fault injection analysis. In this chapter, we provide the readers with some introductory material on fault attacks, which should be helpful in understanding the subsequent chapters and technical discussions in the book.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Patranabis, S., Mukhopadhyay, D. (2018). Introduction to Fault Attacks. In: PATRANABIS, S., Mukhopadhyay, D. (eds) Fault Tolerant Architectures for Cryptography and Hardware Security. Computer Architecture and Design Methodologies. Springer, Singapore. https://doi.org/10.1007/978-981-10-1387-4_1
Download citation
DOI: https://doi.org/10.1007/978-981-10-1387-4_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-1386-7
Online ISBN: 978-981-10-1387-4
eBook Packages: EngineeringEngineering (R0)