메뉴 건너뛰기




Volumn 1, Issue , 2005, Pages 544-549

A countermeasure for em attack of a wireless PDA

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; EMBEDDED SYSTEMS; MOBILE COMPUTING; SECURITY OF DATA;

EID: 24744463878     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/itcc.2005.6     Document Type: Conference Paper
Times cited : (18)

References (17)
  • 1
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • P.Kocher "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems", LNCS 1109, 1996.
    • (1996) LNCS , vol.1109
    • Kocher, P.1
  • 2
    • 0036957308 scopus 로고    scopus 로고
    • Securing wireless data: System architecture challenges
    • S.Ravi, etal. "Securing Wireless Data: System architecture challenges", ISSS, 2002, pp. 195-200.
    • (2002) ISSS , pp. 195-200
    • Ravi, S.1
  • 3
    • 84974679353 scopus 로고    scopus 로고
    • Securing the Rijndael finalists against power analysis attacks
    • T.Messerges, "Securing the Rijndael finalists against power analysis attacks" LNCS 1978, 2001, pp. 150-164.
    • (2001) LNCS , vol.1978 , pp. 150-164
    • Messerges, T.1
  • 4
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Crypto'99
    • P.Kocher, J.Jaffe, B.Jun "Differential Power Analysis" Crypto'99, LNCS 1666, 1999
    • (1999) LNCS , vol.1666
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 5
    • 24744469698 scopus 로고    scopus 로고
    • A new tool for non-intrusive analysis of smartcards based on em emissions
    • Rump Session
    • J-J. Quisquater, etal. "a new tool for non-intrusive analysis of smartcards based on EM emissions", Rump Session, Eurocrypt 2000.
    • Eurocrypt 2000
    • Quisquater, J.-J.1
  • 6
    • 0038557148 scopus 로고    scopus 로고
    • fp.gladman.plus.com/ cryptography_technology/rijndael/aes.spec.311.pdf
    • Dr.Brian Gladman, "A Specification for Rijndael, the AES Algorithm", at fp.gladman.plus.com/ cryptography_technology/rijndael/aes. spec.311.pdf,2003.
    • (2003) A Specification for Rijndael, The AES Algorithm
    • Gladman, B.1
  • 7
    • 35248817849 scopus 로고    scopus 로고
    • The em side-channel(s)
    • D.Agrawal et al. "The EM side-channel(s)" CHES 2002, 2002, pp.29-45.
    • (2002) CHES 2002 , pp. 29-45
    • Agrawal, D.1
  • 8
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic analysis: Concrete results
    • CHES 2001
    • K.Gandolfi etal. "Electromagnetic Analysis: concrete results" CHES 2001, LNCS 2162, pp.251-261.
    • LNCS , vol.2162 , pp. 251-261
    • Gandolfi, K.1
  • 9
    • 84957079591 scopus 로고    scopus 로고
    • Towards sound approaches to counteract power-analysis attacks
    • S.Chari, etal. "Towards sound approaches to counteract power-analysis attacks", LNCS 1666, 1999, pp.398-412.
    • (1999) LNCS , vol.1666 , pp. 398-412
    • Chari, S.1
  • 11
    • 0036911590 scopus 로고    scopus 로고
    • Leakage power modeling and reduction with data retention
    • W.Liao etal. "leakage power modeling and reduction with data retention", IEEE ICCAD, 2002, pp. 714-719.
    • (2002) IEEE ICCAD , pp. 714-719
    • Liao, W.1
  • 12
    • 84937438279 scopus 로고    scopus 로고
    • Power analysis, what is now possible
    • M.Akkar, etal. "Power analysis, what is now possible...", LNCS 1976, 2000, pp489-502.
    • (2000) LNCS , vol.1976 , pp. 489-502
    • Akkar, M.1
  • 13
    • 84949954262 scopus 로고    scopus 로고
    • DPA countermeasure based on the masking method
    • K.Itoh etal. "DPA countermeasure based on the masking method", LNCS 2288, 2002,pp.440-456.
    • (2002) LNCS , vol.2288 , pp. 440-456
    • Itoh, K.1
  • 14
    • 0003070315 scopus 로고    scopus 로고
    • DES and Differential power analysis- The duplication method
    • L.Goubin, J.Patarin "DES and Differential power analysis- the duplication method" CHES 2001.
    • CHES 2001
    • Goubin, L.1    Patarin, J.2
  • 15
    • 0041695788 scopus 로고    scopus 로고
    • Multiplicative masking and power analysis of Rijndael
    • J.Golic "Multiplicative Masking and power analysis of Rijndael", CHES 2002.
    • CHES 2002
    • Golic, J.1
  • 16
    • 68549099555 scopus 로고    scopus 로고
    • nd order power analysis to attack DPA resistant software
    • nd order power analysis to attack DPA resistant software", LNCS 1965, 2000, pp.238-251.
    • (2000) LNCS , vol.1965 , pp. 238-251
    • Messerges, T.1
  • 17
    • 35048870686 scopus 로고    scopus 로고
    • Towards efficient second-order power analysis
    • CHES 2004
    • J.Waddle, D.Wagner "Towards efficient second-order power analysis" CHES 2004, LNCS 3156, pp.1-15.
    • LNCS , vol.3156 , pp. 1-15
    • Waddle, J.1    Wagner, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.