References
Boneh D, DeMillo R, Lipton R. On the importance of checking cryptographic protocols for faults. In: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, 1997. 37–51
Kocher P, Jaffe J, Jun B. Differential power analysis. In: Proceedings of the 19th Annual International Cryptology Conference, Santa Barbara, 1999. 388–397
Tupsamudre H, Bisht S, Mukhopadhyay D. Destroying fault invariant with randomization. In: Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, Busan, 2014. 93–111
Battistello A, Giraud C. A note on the security of CHES 2014 symmetric infective countermeasure. In: Proceedings of the 7th International Workshop on Constructive Side Channel Analysis and Secure Design, Graz, 2016. 144–159
Cojocar L, Papagiannopoulos K, Timmers N. Instruction duplication: leaky and not too fault-tolerant! In: Proceedings of International Conference on Smart Card Research and Advanced Applications, Lugano, 2017. 160–179
Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model. In: Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, Cambridge, 2004. 16–29
Acknowledgements
This work was supported by National Key R&D Program of China (Grant Nos. 2018YFB-0904900, 2018YFB0904901), National Cryptography Development Fund (Grant No. MMJJ20170214), and National Cryptography Development Fund (Grant No. MMJJ2017-0211).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Feng, J., Chen, H., Cao, W. et al. Do multiple infections lead to better security? A new study on CHES 2014 infective countermeasure. Sci. China Inf. Sci. 64, 159101 (2021). https://doi.org/10.1007/s11432-018-9797-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-018-9797-9