메뉴 건너뛰기




Volumn 3386, Issue , 2005, Pages 85-103

On the optimization of side-channel attacks by advanced stochastic methods

Author keywords

Montgomery's multiplication algorithm; Optimal decision strategy; Side channel attack; Statistical decision problem; Stochastic process

Indexed keywords

DECISION MAKING; EFFICIENCY; OPTIMIZATION; RANDOM PROCESSES;

EID: 24144473659     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30580-4_7     Document Type: Conference Paper
Times cited : (19)

References (20)
  • 2
    • 35248836120 scopus 로고    scopus 로고
    • Password Interception in a SSL/TSL Channel
    • D. Boneh (ed.): Crypto 2003, Springer, Heidelberg
    • B. Canvel, A. Hiltgen, S. Vaudenay, M. Vuagnoux: Password Interception in a SSL/TSL Channel. In: D. Boneh (ed.): Crypto 2003, Lecture Notes in Computer Science 2729, Springer, Heidelberg (2003), 583-599.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 583-599
    • Canvel, B.1    Hiltgen, A.2    Vaudenay, S.3    Vuagnoux, M.4
  • 3
    • 0001494997 scopus 로고    scopus 로고
    • Small solutions to polynomial equations, and low exponent RSA vulnerabilities
    • D. Coppersmith: Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities. J. Cryptology 10 (no. 4) (1997) 233-260.
    • (1997) J. Cryptology , vol.10 , Issue.4 , pp. 233-260
    • Coppersmith, D.1
  • 4
    • 84954462346 scopus 로고    scopus 로고
    • A practical implementation of the timing attack
    • J.-J. Quisquater and B. Schneier (eds.): Smart Card - Research and Applications, Springer, Berlin
    • J.-F. Dhem, F. Koeune, P.-A. Leroux, P.-A. Mestré, J.-J. Quisquater, J.-L. Willems: A Practical Implementation of the Timing Attack. In: J.-J. Quisquater and B. Schneier (eds.): Smart Card - Research and Applications, Springer, Lecture Notes in Computer Science 1820, Berlin (2000), 175-191.
    • (2000) Lecture Notes in Computer Science , vol.1820 , pp. 175-191
    • Dhem, J.-F.1    Koeune, F.2    Leroux, P.-A.3    Mestré, P.-A.4    Quisquater, J.-J.5    Willems, J.-L.6
  • 5
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems
    • N. Koblitz (ed.): Crypto 1996, Springer, Heidelberg
    • P. Kocher: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems. In: N. Koblitz (ed.): Crypto 1996, Springer, Lecture Notes in Computer Science 1109, Heidelberg (1996), 104-113.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 6
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic analysis: Concrete results
    • Ç.K. Koç, D. Naccache, C. Paar (eds.): Cryptographic Hardware and Embedded Systems - CHES 2001, Springer, Berlin
    • K. Gandolfi, G. Mourtel, F. Olivier: Electromagnetic Analysis: Concrete Results. In: Ç.K. Koç, D. Naccache, C. Paar (eds.): Cryptographic Hardware and Embedded Systems - CHES 2001, Springer, Lecture Notes in Computer Science 2162, Berlin (2001), 251-261.
    • (2001) Lecture Notes in Computer Science , vol.2162 , pp. 251-261
    • Gandolfi, K.1    Mourtel, G.2    Olivier, F.3
  • 7
    • 24144497857 scopus 로고    scopus 로고
    • A timing attack against Rijndael
    • Catholic University of Louvain, Crypto Group
    • F. Koeune, J.-J. Quisquater: A Timing Attack against Rijndael. Catholic University of Louvain, Crypto Group, Technical report CG-1999/1, 1999.
    • (1999) Technical Report , vol.CG-1999-1
    • Koeune, F.1    Quisquater, J.-J.2
  • 8
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • M. Wiener (ed.): Crypto 1999, Springer, Berlin
    • P. Kocher, J. Jaffe, B. Jub: Differential Power Analysis. In: M. Wiener (ed.): Crypto 1999, Springer, Lecture Notes in Computer Science 1666, Berlin (1999), 388-397.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jub, B.3
  • 10
    • 33645597409 scopus 로고    scopus 로고
    • Probabilistic and statistical methods in cryptology. An introduction by selected topics
    • Springer, Berlin
    • D. Neuenschwander: Probabilistic and Statistical Methods in Cryptology. An Introduction by Selected Topics. Springer, Lecture Notes in Computer Science 3028, Berlin (2004).
    • (2004) Lecture Notes in Computer Science , vol.3028
    • Neuenschwander, D.1
  • 11
    • 33645606527 scopus 로고    scopus 로고
    • Exact analysis of montgomery multiplication
    • TU Darmstadt
    • H. Sato, D. Schepers, T. Takagi: Exact Analysis of Montgomery Multiplication. TU Darmstadt, Technical Report TI-6/04.
    • Technical Report , vol.TI-6-04
    • Sato, H.1    Schepers, D.2    Takagi, T.3
  • 12
    • 84983436061 scopus 로고    scopus 로고
    • Optimized timing attacks against public key cryptosystems
    • W. Schindler: Optimized Timing Attacks against Public Key Cryptosystems. Statist. Decisions 20 (2002), 191-210.
    • (2002) Statist. Decisions , vol.20 , pp. 191-210
    • Schindler, W.1
  • 13
    • 68549092451 scopus 로고    scopus 로고
    • A timing attack against RSA with the chinese remainder theorem
    • Ç.K. Koç, C. Paar (eds.): Cryptographic Hardware and Embedded Systems - CHES 2000, Springer, Berlin
    • W. Schindler: A Timing Attack against RSA with the Chinese Remainder Theorem. In: Ç.K. Koç, C. Paar (eds.): Cryptographic Hardware and Embedded Systems - CHES 2000, Springer, Lecture Notes in Computer Science 1965, Berlin (2000), 110-125.
    • (2000) Lecture Notes in Computer Science , vol.1965 , pp. 110-125
    • Schindler, W.1
  • 14
    • 18844409918 scopus 로고    scopus 로고
    • Unleashing the full power of timing attack
    • Catholic University of Louvain
    • W. Schindler, F. Koeune, J.-J. Quisquater: Unleashing the Full Power of Timing Attack. Catholic University of Louvain, Technical Report CG-2001/3.
    • Technical Report , vol.CG-2001-3
    • Schindler, W.1    Koeune, F.2    Quisquater, J.-J.3
  • 15
    • 84946828535 scopus 로고    scopus 로고
    • Improving divide and conquer attacks against cryptosystems by better error detection / correction strategies
    • B. Honary (ed.): Cryptography and Coding - IMA 2001, Springer, Berlin
    • W. Schindler, F. Koeune, J.-J. Quisquater: Improving Divide and Conquer Attacks Against Cryptosystems by Better Error Detection / Correction Strategies. In: B. Honary (ed.): Cryptography and Coding - IMA 2001, Springer, Lecture Notes in Computer Science 2260, Berlin (2001), 245-267.
    • (2001) Lecture Notes in Computer Science , vol.2260 , pp. 245-267
    • Schindler, W.1    Koeune, F.2    Quisquater, J.-J.3
  • 16
    • 84958960266 scopus 로고    scopus 로고
    • A combined timing and power attack
    • P. Paillier, D. Naccache (eds.): Public Key Cryptography - PKC 2002, Springer, Berlin
    • W. Schindler: A Combined Timing and Power Attack. In: P. Paillier, D. Naccache (eds.): Public Key Cryptography - PKC 2002, Springer, Lecture Notes in Computer Science 2274, Berlin (2002), 263-279.
    • (2002) Lecture Notes in Computer Science , vol.2274 , pp. 263-279
    • Schindler, W.1
  • 17
    • 33645591077 scopus 로고    scopus 로고
    • More detail for a combined timing and power attack against implementations of RSA
    • K.G. Paterson (ed.): Cryptography and Coding - IMA 2003, Springer, Berlin
    • W. Schindler, C. Walter: More Detail for a Combined Timing and Power Attack against Implementations of RSA. In: K.G. Paterson (ed.): Cryptography and Coding - IMA 2003, Springer, Lecture Notes in Computer Science 2898, Berlin (2003), 245-263.
    • (2003) Lecture Notes in Computer Science , vol.2898 , pp. 245-263
    • Schindler, W.1    Walter, C.2
  • 18
    • 84944900219 scopus 로고    scopus 로고
    • Precise bounds for montgomery montgomery modular multiplication and some potentially insecure RSA moduli
    • B. Preneel (ed.): Topics in Cryptology - CT-RSA 2002, Springer, Berlin
    • C.D. Walter: Precise Bounds for Montgomery Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli. In: B. Preneel (ed.): Topics in Cryptology - CT-RSA 2002, Springer, Lecture Notes in Computer Science 2271, Berlin (2002), 30-39.
    • (2002) Lecture Notes in Computer Science , vol.2271 , pp. 30-39
    • Walter, C.D.1
  • 19
    • 84937560280 scopus 로고    scopus 로고
    • Distinguishing exponent digits by observing modular subtractions
    • D. Naccache (ed.): Topics in Cryptology - CT-RSA 2001, Springer, Berlin
    • C.D. Walter, S. Thompson: Distinguishing Exponent Digits by Observing Modular Subtractions. In: D. Naccache (ed.): Topics in Cryptology - CT-RSA 2001, Springer, Lecture Notes in Computer Science 2020, Berlin (2001), 192-207.
    • (2001) Lecture Notes in Computer Science , vol.2020 , pp. 192-207
    • Walter, C.D.1    Thompson, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.