Discusses the latest fault attacks on a wide variety of cryptographic implementations, such as biased fault attacks, algebraic fault attacks, and attacks on authenticated encryption based ciphers
Offers hands-on and practical demonstrations for handling complex secure cryptographic architectures, complementing the theoretical analysis