Conference paper

Avatar: Reinforcing Fault Attack Countermeasures in EDA with Fault Transformations

Cryptography hardware are highly vulnerable to a class of side-channel attacks known as Differential Fault Analysis (DFA). These attacks exploit fault induced errors to compromise secret keys from ciphers within a few seconds. A bias in the error …