P Khanna, C Rebeiro, A Hazra - 2017 54th ACM/EDAC/IEEE …, 2017 - ieeexplore.ieee.org
Fault attacks recover secret keys by exploiting faults injected during the execution of a block
cipher. However, not all faults are exploitable and every exploitable fault is associated with …