메뉴 건너뛰기




Volumn 2523, Issue , 2003, Pages 244-259

Further Results and Considerations on Side Channel Attacks on RSA

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; EMBEDDED SYSTEMS; HARDWARE;

EID: 26344445171     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36400-5_19     Document Type: Article
Times cited : (15)

References (25)
  • 2
    • 0023985196 scopus 로고
    • RSA and Rabin functions: Certain parts are as hard as the whole
    • Alexi, W., Chor, B., Goldreich, O. and Schnorr, C.: RSA and Rabin functions: Certain parts are as hard as the whole, SIAM Journal on Computing, 17(2), pp. 194-209, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 194-209
    • Alexi, W.1    Chor, B.2    Goldreich, O.3    Schnorr, C.4
  • 3
    • 0040320732 scopus 로고    scopus 로고
    • Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults
    • Bao, F., Deng, R.-H., Han, Y., Jeng, A., Narasimhalu, A.-D. and Ngair, T.: Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults, in Proc. of Security Protocols '97, pp. 115-124, 1997.
    • (1997) Proc. of Security Protocols '97 , pp. 115-124
    • Bao, F.1    Deng, R.-H.2    Han, Y.3    Jeng, A.4    Narasimhalu, A.-D.5    Ngair, T.6
  • 4
    • 0027726717 scopus 로고
    • Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
    • October 20, 1995, originally published ACM, November
    • Bellare, M. and Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, October 20, 1995, originally published in Proc. of the First ACM Conference on Computer and Communications Security, ACM, November 1993.
    • (1993) Proc. of the First ACM Conference on Computer and Communications Security
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 84957693225 scopus 로고    scopus 로고
    • Chosen Ciphertexts Attacks Against Protocols Based on the RSA Encryption Standard PKCS#1
    • Bleichenbacher, D.: Chosen Ciphertexts Attacks Against Protocols Based on the RSA Encryption Standard PKCS#1, in Proc. of CRYPTO '98, pp. 1-12, 1998.
    • (1998) Proc. of CRYPTO '98 , pp. 1-12
    • Bleichenbacher, D.1
  • 6
    • 0000552770 scopus 로고    scopus 로고
    • Twenty Years of Attacks on the RSA Cryplosysteins
    • Boneh, D.: Twenty Years of Attacks on the RSA Cryplosysteins, Notices of the American Mathematical Society, vol. 46, no. 2, pp. 203-213, 1999.
    • (1999) Notices of the American Mathematical Society , vol.46 , Issue.2 , pp. 203-213
    • Boneh, D.1
  • 7
    • 84957355967 scopus 로고    scopus 로고
    • On the Importance of Checking Cryptographic Protocols for Faults
    • Boneh, D., DeMillo, R. A. and Lipton, R. J.: On the Importance of Checking Cryptographic Protocols for Faults, in Proc. of EUROCRYPT '97, pp. 37-51, 1997.
    • (1997) Proc. of EUROCRYPT '97 , pp. 37-51
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 8
    • 84957079591 scopus 로고    scopus 로고
    • Towards Sound Approaches to Counteract Power-Analysis Attacks
    • Chari, S., Jutla, C.-S., Rao, J. and Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks, in Proc. of CRYPTO '99, pp. 398-411, 1999.
    • (1999) Proc. of CRYPTO '99 , pp. 398-411
    • Chari, S.1    Jutla, C.-S.2    Rao, J.3    Rohatgi, P.4
  • 9
    • 84957376046 scopus 로고    scopus 로고
    • Stronger Security Proofs for RSA and Rabin Bits
    • Fischlin, R. and Schnorr, C. P.: Stronger Security Proofs for RSA and Rabin Bits, in Proc. of EUROCRYPT '97, pp. 267-279, 1997.
    • (1997) Proc. of EUROCRYPT '97 , pp. 267-279
    • Fischlin, R.1    Schnorr, C.P.2
  • 10
    • 0011189534 scopus 로고    scopus 로고
    • Stronger Security Proofs for RSA and Rabin Bits
    • IACR
    • Fischlin, R. and Schnorr, C. P.: Stronger Security Proofs for RSA and Rabin Bits, Journal of Cryptology, Vol. 13, No. 2, pp. 221-244, IACR, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.2 , pp. 221-244
    • Fischlin, R.1    Schnorr, C.P.2
  • 12
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic Analysis: Concrete Results
    • Gandolfi, K., Mourtel, C. and Olivier, F.: Electromagnetic Analysis: Concrete Results, in Proc. of CHES 2001, pp. 251-261, 2001.
    • (2001) Proc. of CHES , vol.2001 , pp. 251-261
    • Gandolfi, K.1    Mourtel, C.2    Olivier, F.3
  • 13
    • 0032305852 scopus 로고    scopus 로고
    • The Security of Individual RSA Bits
    • Håstad, J. and Näslund M.: The Security of Individual RSA Bits, in Proc. of FOCS '98, pp. 510-521, 1998.
    • (1998) Proc. of FOCS '98 , pp. 510-521
    • Håstad, J.1    Näslund, M.2
  • 14
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis: Leaking Secrets
    • Kocher, P., Jaffe, J. and Jun, B.: Differential Power Analysis: Leaking Secrets, in Proc. of CRYPTO '99, pp. 388-397, 1999.
    • (1999) Proc. of CRYPTO '99 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 15
    • 33846862428 scopus 로고    scopus 로고
    • A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS#1, in
    • Manger, J.: A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS#1, in Proc. of CRYPTO 2001, pp. 230-238, 2001.
    • (2001) Proc. of CRYPTO , pp. 230-238
    • Manger, J.1
  • 17
    • 33645982038 scopus 로고    scopus 로고
    • PKCS#1 v2.1: RSA Labs, DRAFT2, January 5
    • PKCS#1 v2.1: RSA Cryptography Standard, RSA Labs, DRAFT2, January 5 2001.
    • (2001) RSA Cryptography Standard
  • 19
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • Pohlig S.C., Hellman M.E.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Trans. Inform. Theory, 24 (1978), 106-110.
    • (1978) IEEE Trans. Inform. Theory , vol.24 , pp. 106-110
    • Pohlig, S.C.1    Hellman, M.E.2
  • 21
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosysteins
    • Rivest, R., L., Shamir, A. and Adleman L.: A method for obtaining digital signatures and public-key cryptosysteins. Communications of the ACM, pp. 120-126, 1978.
    • (1978) Communications of the ACM , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 22
    • 35248817868 scopus 로고    scopus 로고
    • Secure Hash Standard, FIPS Pub 180-1, 1995 April 17.
    • Secure Hash Standard, FIPS Pub 180-1, 1995 April 17.
  • 24
    • 84880904783 scopus 로고    scopus 로고
    • OAEP Reconsidered (Extended Abstract)
    • Shoup, V.: OAEP Reconsidered (Extended Abstract), in Proc. of CRYPTO 2001, pp. 239-259, 2001.
    • (2001) Proc. of CRYPTO 2001 , pp. 239-259
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.