메뉴 건너뛰기




Volumn 1, Issue , 2005, Pages 562-567

On the masking countermeasure and higher-order power analysis attacks

Author keywords

[No Author keywords available]

Indexed keywords

BOOLEAN FUNCTIONS; ENERGY UTILIZATION; MATHEMATICAL MODELS; PARALLEL PROCESSING SYSTEMS; PROGRAM PROCESSORS; SMART CARDS;

EID: 24744434942     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/itcc.2005.213     Document Type: Conference Paper
Times cited : (48)

References (21)
  • 1
    • 84943615552 scopus 로고    scopus 로고
    • An implementation of des and AES secure againts some attacks
    • the proceedings of CHES 2001, Paris, France, May, Springer-Verlag
    • M.L. Akkar, C. Giraud, An Implementation of DES and AES Secure againts Some Attacks, in the proceedings of CHES 2001, Lecture Notes in Computer Sciences, vol 2162, pp 309-318, Paris, France, May 2001, Springer-Verlag.
    • (2001) Lecture Notes in Computer Sciences , vol.2162 , pp. 309-318
    • Akkar, M.L.1    Giraud, C.2
  • 4
    • 35048818034 scopus 로고    scopus 로고
    • Correlation power analysis with a leakage model
    • the proceedings of CHES 2004, Boston, USA, August
    • E. Brier, C. Clavier, F. Olivier, Correlation Power Analysis with a Leakage Model, in the proceedings of CHES 2004, Lecture Notes in Computer Science, vol 3156, pp 16-29, Boston, USA, August 2004.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 16-29
    • Brier, E.1    Clavier, C.2    Olivier, F.3
  • 5
    • 84957079591 scopus 로고    scopus 로고
    • Towards sound approaches to counteract power-analysis attacks
    • the proceedings of Crypto 1999, Santa Barbara, California, USA, August, Springer-Verlag
    • S. Chari C. Jutla, J. Rao, P. Rohatgi, Towards Sound Approaches to Counteract Power-Analysis Attacks, in the proceedings of Crypto 1999, Lecture Notes in Computer Science, vol 1666, pp 398-412, Santa Barbara, California, USA, August 1999, Springer-Verlag.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 398-412
    • Chari, S.1    Jutla, C.2    Rao, J.3    Rohatgi, P.4
  • 6
    • 84937540201 scopus 로고    scopus 로고
    • Fast implementation and fair comparison of the final candidates for the advanced encryption standard using field programmable gate arrays
    • Cryptographer's Track, San Francisco, CA, April 8-12
    • K. Gaj, P. Chodowiec, Fast Implementation and fair Comparison of the Final Candidates for the Advanced Encryption Standard using Field Programmable Gate Arrays, in the proceedings of the RSA Security Conference - Cryptographer's Track, San Francisco, CA, April 8-12, 2001, pp. 84-99.
    • (2001) The Proceedings of the RSA Security Conference , pp. 84-99
    • Gaj, K.1    Chodowiec, P.2
  • 7
    • 84949520149 scopus 로고    scopus 로고
    • DES and differential power analysis
    • the proceedings of CHES 1999, Worcester, Massachussets, USA, August, Springer-Verlag
    • L. Goubin, J. Patarin, DES and Differential Power Analysis, in the proceedings of CHES 1999, Lecture Notes in Computer Science, vol 1717, pp 158-172, Worcester, Massachussets, USA, August 1999, Springer-Verlag.
    • (1999) Lecture Notes in Computer Science , vol.1717 , pp. 158-172
    • Goubin, L.1    Patarin, J.2
  • 8
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • the proceedings of CRYPTO 99, Santa Barbara, USA, August, Springer-Verlag
    • P. Kocher, J. Jaffe, B. Jun, Differential Power Analysis, in the proceedings of CRYPTO 99, Lecture Notes in Computer Science, vol 1666, pp 398-412, Santa Barbara, USA, August 1999, Springer-Verlag.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 398-412
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 9
    • 24744448917 scopus 로고    scopus 로고
    • Why the masking of CMOS gates does not prevent DPA attacks?
    • to appear
    • S.Mangard, Why the Masking of CMOS Gates Does Not Prevent DPA Attacks?, to appear in the proceedings of CT-RSA 05.
    • The Proceedings of CT-RSA 05
    • Mangard, S.1
  • 10
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • May
    • T.S. Messerges, E.A. Dabbish, R.H. Sloan, Examining Smart-Card Security under the Threat of Power Analysis Attacks, IEEE Transactions on Computers, vol 51, num 5, pp 541-552, May 2002.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 11
    • 68549099555 scopus 로고    scopus 로고
    • Using second-order power analysis to attack DPA resistant software
    • the proceedings of CHES 2000, Worcester, Massachusetts, USA, August, Springer-Verlag
    • T.S. Messerges, Using Second-Order Power Analysis to Attack DPA Resistant Software, in the proceedings of CHES 2000, Lecture Notes in Computer Sciences, vol 1965, pp 71-77, Worcester, Massachusetts, USA, August 2000, Springer-Verlag.
    • (2000) Lecture Notes in Computer Sciences , vol.1965 , pp. 71-77
    • Messerges, T.S.1
  • 12
    • 34248682000 scopus 로고
    • FIPS PUB 46, the data encryption standard
    • NIST, U.S. Dept. of Commerce, Jan
    • National Bureau of Standards, FIPS PUB 46, The Data Encryption Standard, Federal Information Processing Standard, NIST, U.S. Dept. of Commerce, Jan 1977.
    • (1977) Federal Information Processing Standard
  • 13
    • 0003508558 scopus 로고    scopus 로고
    • FIPS 197, advanced encryption standard
    • NIST, U.S. Dept. of Commerce. November
    • National Bureau of Standards, FIPS 197, Advanced Encryption Standard, Federal Information Processing Standard, NIST, U.S. Dept. of Commerce. November 2001.
    • (2001) Federal Information Processing Standard
  • 15
    • 26444505856 scopus 로고    scopus 로고
    • Secure and efficient masking of AES - A mission impossible?
    • E. Oswald, S. Mangard, N. Pramstaller, Secure and Efficient Masking of AES - A Mission Impossible?, IACR e-print archive 2004/134, http://eprint.iacr. org. 2004.
    • (2004) IACR e-print Archive , vol.2004 , Issue.134
    • Oswald, E.1    Mangard, S.2    Pramstaller, N.3
  • 17
    • 33750838121 scopus 로고    scopus 로고
    • Design strategies and modifed descriptions to optimize cipher FPGA implementations: Fast and compact results for des and triple-DES
    • the proceedings of FPL 2003, Lisbon, Portugal, September, Springer-Verlag
    • G.Rouvroy, F.-X.Standaert, J.-J.Quisquater, J.-D.Legat, Design Strategies and Modifed Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Triple-DES, in the proceedings of FPL 2003, Lecture Notes in Computer Science, vol 2778, pp 181-193, Lisbon, Portugal, September 2003, Springer-Verlag.
    • (2003) Lecture Notes in Computer Science , vol.2778 , pp. 181-193
    • Rouvroy, G.1    Standaert, F.-X.2    Quisquater, J.-J.3    Legat, J.-D.4
  • 19
    • 24744465637 scopus 로고    scopus 로고
    • Power analysis of an FPGA implementation of rijndael: Is pipelining a DPA countermeasure?
    • the proceedings of CHES 2004, Boston, USA, August
    • F.-X. Standaert, S.B. Ors, B. Preneel, Power Analysis of an FPGA Implementation of Rijndael: is Pipelining a DPA Countermeasure?, in the proceedings of CHES 2004, Lecture Notes in Computer Science, vol 3156, pp 30-44, Boston, USA, August 2004.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 30-44
    • Standaert, F.-X.1    Ors, S.B.2    Preneel, B.3
  • 20
    • 35048870686 scopus 로고    scopus 로고
    • Towards efficient second-order power analysis
    • the proceedings of CHES 2004, Boston, USA, August
    • J. Waddle, D. Wagner, Towards Efficient Second-Order Power Analysis, in the proceedings of CHES 2004, Lecture Notes in Computer Science, vol 3156, pp 1-15, Boston, USA, August 2004.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 1-15
    • Waddle, J.1    Wagner, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.