X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (2747) 2747
Conference Proceeding (1770) 1770
Newspaper Article (197) 197
Book Chapter (138) 138
Magazine Article (64) 64
Government Document (36) 36
Dissertation (29) 29
Book / eBook (23) 23
Trade Publication Article (20) 20
Web Resource (13) 13
Book Review (6) 6
Publication (3) 3
Reference (3) 3
Newsletter (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
fault tolerance (1297) 1297
engineering, electrical & electronic (647) 647
security (604) 604
faults (544) 544
algorithms (499) 499
cryptography (494) 494
computer science (493) 493
circuit faults (453) 453
fault detection (451) 451
computer science, information systems (342) 342
analysis (338) 338
computer simulation (336) 336
hardware (330) 330
fault diagnosis (327) 327
computer science, theory & methods (306) 306
networks (302) 302
sensors (295) 295
mathematical models (283) 283
telecommunications (264) 264
computer science, hardware & architecture (262) 262
encryption (248) 248
fault attacks (236) 236
fault attack (226) 226
robustness (224) 224
automation & control systems (221) 221
reliability (216) 216
fault tolerant systems (206) 206
design (205) 205
power system faults (197) 197
computer science, software engineering (196) 196
engineering (195) 195
failure (194) 194
wireless sensor networks (183) 183
computer security (182) 182
power system protection (181) 181
studies (177) 177
software (173) 173
control systems (171) 171
computer communication networks (170) 170
methods (167) 167
aes (166) 166
computer networks (165) 165
internet (156) 156
differential fault analysis (153) 153
protocols (153) 153
optimization (148) 148
mathematical analysis (143) 143
fault injection (140) 140
clocks (132) 132
data encryption (131) 131
actuators (129) 129
computer information security (128) 128
monitoring (128) 128
wireless networks (128) 128
engineering sciences (126) 126
fault lines (123) 123
research (123) 123
protection (122) 122
fault-tolerance (121) 121
redundancy (121) 121
systems (120) 120
usage (120) 120
instruments & instrumentation (119) 119
data security (116) 116
mathematical model (115) 115
resilience (115) 115
cloud computing (109) 109
ciphers (108) 108
registers (105) 105
mathematics, applied (104) 104
servers (104) 104
neural networks (103) 103
field programmable gate arrays (102) 102
algorithm design and analysis (100) 100
design engineering (100) 100
fault location (100) 100
aircraft (99) 99
artificial intelligence (99) 99
earthquakes (99) 99
protocol (98) 98
communications engineering, networks (97) 97
microelectronics (97) 97
computer architecture (96) 96
simulation (96) 96
countermeasures (95) 95
routing (94) 94
computation (93) 93
micro and nanotechnologies (93) 93
computer programs (92) 92
computer science, artificial intelligence (92) 92
fault analysis (89) 89
fault-tolerant control (88) 88
electrical engineering (87) 87
engineering, aerospace (87) 87
logic gates (87) 87
cryptography and security (85) 85
mathematics (85) 85
operating systems (85) 85
authentication (84) 84
electronics (83) 83
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (3) 3
Gerstein Science - Stacks (2) 2
Aerospace - Stacks (1) 1
Collection Dvlpm't (Acquisitions) - Closed Orders (1) 1
Earth Sciences (Noranda) - Oversize (1) 1
Engineering & Comp. Sci. - Stacks (1) 1
Robarts - Stacks (1) 1
UofT at Mississauga - May be requested in 6-10 wks (1) 1
UofT at Mississauga - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (4919) 4919
Chinese (87) 87
Japanese (48) 48
Korean (14) 14
Portuguese (3) 3
Russian (3) 3
Spanish (2) 2
German (1) 1
Indonesian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2018, 1st ed. 2018, Computer architecture and design methodologies, ISBN 9811013861, 242
This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography... 
Fault-tolerant computing | Computer security | Engineering | Circuits and Systems | Security Science and Technology | Data Encryption
eBook
IEEE transactions on automatic control, ISSN 1558-2523, 2013, Volume 58, Issue 11, pp. 2715 - 2729
Journal Article
Proceedings of the IEEE, ISSN 0018-9219, 11/2012, Volume 100, Issue 11, pp. 3056 - 3076
.... Although the current standard cryptographic algorithms proved to withstand exhaustive attacks, their hardware and software implementations have exhibited vulnerabilities to side channel attacks, e.g... 
Algorithm design and analysis | Fault diagnosis | side-channel attacks | cryptographic devices | Public key | Countermeasures | Encryption | Power systems | fault injection | Circuit faults | Cryptography | power analysis | RESISTANT | ERRORS | IMPLEMENTATION | ENGINEERING, ELECTRICAL & ELECTRONIC | Algorithms | Faults | Military technology | Budgeting | Devices | Channels | Cryptography and Security | Computer Science
Journal Article
Journal of Cryptology, ISSN 0933-2790, 10/2016, Volume 29, Issue 4, pp. 775 - 805
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 05/2018, Volume 13, Issue 5, pp. 1110 - 1122
Perceiving and understanding cyber-attacks can be a difficult task. This problem is widely recognized and welldocumented, and more effective techniques are needed to aid cyber-attack perception... 
Visualization | Adaptation models | Correlation | cyber-visualisation | attack graph | attack modelling | Syntactics | attack tree | fault tree | Computer security | Cyber-attack | Fault trees | cybervisualisation | COMPUTER SCIENCE, THEORY & METHODS | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
Computer Journal, ISSN 0010-4620, 2018, Volume 61, Issue 8, pp. 1166 - 1179
Fault attack is one of the most efficient side channel attacks and has attracted much attention in recent public cryptographic literatures... 
Authenticated cipher | ACORN | CAESAR | Stream cipher | Fault attack | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | authenticated cipher | stream cipher | COMPUTER SCIENCE, INFORMATION SYSTEMS | COMPUTER SCIENCE, THEORY & METHODS | fault attack
Journal Article
Journal Article
IEEE Transactions on Computers, ISSN 0018-9340, 10/2017, Volume 66, Issue 10, pp. 1804 - 1808
Journal Article
by Amir, Y and Coan, B and Kirsch, J and Lane, J
IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, 07/2011, Volume 8, Issue 4, pp. 564 - 577
Journal Article
Proceedings of the IEEE, ISSN 0018-9219, 02/2006, Volume 94, Issue 2, pp. 370 - 382
Journal Article
International journal of electrical power & energy systems, ISSN 0142-0615, 2018, Volume 99, pp. 540 - 554
Journal Article
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, ISSN 1063-8210, 12/2013, Volume 21, Issue 12, pp. 2295 - 2306
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8639, pp. 134 - 145
Journal Article
Proceedings of the IEEE, ISSN 1558-2256, 2014, Volume 102, Issue 8, pp. 1229 - 1247
Journal Article
IEEE Transactions on Computers, ISSN 0018-9340, 03/2018, Volume 67, Issue 3, pp. 348 - 360
.... However, this requires challenging reverse-engineering steps in practice. We argue that this is a major reason why bitstream fault injection attacks have been largely neglected in the past... 
FPGA security | automated key recovery | bitstream fault injection | Hardware | Table lookup | Encryption | Circuit faults | bitstream encryption vulnerability | Field programmable gate arrays | AES | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | ENGINEERING, ELECTRICAL & ELECTRONIC | Static random access memory | Usage | Research | Cryptography | Digital integrated circuits
Journal Article
2011, Lecture Notes in Computer Science, ISBN 3642272568, Volume 7079
Book Chapter
PloS one, ISSN 1932-6203, 2019, Volume 14, Issue 4, p. e0214292
Journal Article
International journal of distributed sensor networks, ISSN 1550-1477, 2017, Volume 13, Issue 12, p. 155014771774146
Journal Article