I'm afraid I don't follow all of dsds's post above.
dsds, are you describing a modified attack model where the attacker does not need to know \delta, but does need to be able to xor it with the pos
Forum: 2010 Reports
I think this new attak could be seen as a special kind of differential fault analysis on AES-128, where the adversary can choose a special concrete value of the fault (\delta) in an appropriate positi
Forum: 2010 Reports
Without entering to the question whether the related-subkey model is "legitimate", the attack of 2010/337 assumes that the adversary is given two plaintexts which are related in a very strong manner (
Forum: 2010 Reports