메뉴 건너뛰기




Volumn 3557, Issue , 2005, Pages 413-423

A side-channel analysis resistant description of the AES S-box

Author keywords

AES; Masking schemes; Side channel analysis

Indexed keywords

ALGORITHMS; COMPUTER SOFTWARE; CRYPTOGRAPHY; LINEAR SYSTEMS;

EID: 26444465110     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11502760_28     Document Type: Conference Paper
Times cited : (240)

References (15)
  • 1
    • 35048848006 scopus 로고    scopus 로고
    • Two power analysis attacks against one-mask methods
    • Bimal K. Roy and Willi Meier, editors, Fast Software Encryption - FSE 2004. Springer
    • M.-L. Akkar, R. Bevan, and L. Goubin. Two Power Analysis Attacks against One-Mask Methods. In Bimal K. Roy and Willi Meier, editors, Fast Software Encryption - FSE 2004, volume 3017 of Lecture Notes in Computer Science, pages 332-347. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3017 , pp. 332-347
    • Akkar, M.-L.1    Bevan, R.2    Goubin, L.3
  • 2
    • 84943615552 scopus 로고    scopus 로고
    • An implementation of des and AES, secure against some attacks
    • Çetin Kaya Koç, David Naccache, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2001. Springer
    • Mehdi-Laurent Akkar and Christophe Giraud. An Implementation of DES and AES, Secure against Some Attacks. In Çetin Kaya Koç, David Naccache, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 309-318. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2162 , pp. 309-318
    • Akkar, M.-L.1    Giraud, C.2
  • 4
    • 84957079591 scopus 로고    scopus 로고
    • Towards sound approaches to counteract power-analysis attacks
    • Michael J. Wiener, editor, Advances in Cryptology - CRYPTO '99. Springer
    • Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, and Pankaj Rohatgi. Towards Sound Approaches to Counteract Power-Analysis Attacks. In Michael J. Wiener, editor, Advances in Cryptology - CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 398-412. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 398-412
    • Chari, S.1    Jutla, C.S.2    Rao, J.R.3    Rohatgi, P.4
  • 6
    • 35248830819 scopus 로고    scopus 로고
    • Multiplicative masking and power analysis of AES
    • Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002. Springer
    • Jovan D. Golić and Christophe Tymen. Multiplicative Masking and Power Analysis of AES. In Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, volume 2535 of Lecture Notes in Computer Science, pages 198-212. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2535 , pp. 198-212
    • Golić, J.D.1    Tymen, C.2
  • 8
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Michael Wiener, editor, Advances in Cryptology - CRYPTO '99. Springer
    • Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power Analysis. In Michael Wiener, editor, Advances in Cryptology - CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 12
    • 84946832086 scopus 로고    scopus 로고
    • A compact rijndael hardware architecture with S-box optimization
    • Colin Boyd, editor. Springer
    • Akashi Satoh, Sumio Morioka, Kohji Takano, and Seiji Munetoh. A Compact Rijndael Hardware Architecture with S-Box Optimization. In Colin Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, pages 239-254. Springer, 2001.
    • (2001) Advances in Cryptology - ASIACRYPT 2001 , pp. 239-254
    • Satoh, A.1    Morioka, S.2    Takano, K.3    Munetoh, S.4
  • 13
    • 35248890508 scopus 로고    scopus 로고
    • Simplified adaptive multiplicative masking for AES
    • Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors. Springer
    • Elena Trichina, Domenico De Seta, and Lucia Germani. Simplified Adaptive Multiplicative Masking for AES. In Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, pages 187-197. Springer, 2003.
    • (2003) Cryptographic Hardware and Embedded Systems - CHES 2002 , pp. 187-197
    • Trichina, E.1    De Seta, D.2    Germani, L.3
  • 14
    • 35248825993 scopus 로고    scopus 로고
    • Securing encryption algorithms against DPA at the logic level: Next generation smart card technology
    • Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Springer
    • Kris Tiri and Ingrid Verbauwhede. Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology. In Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, pages 125-136. Springer, 2003.
    • (2003) Cryptographic Hardware and Embedded Systems - CHES 2002 , pp. 125-136
    • Tiri, K.1    Verbauwhede, I.2
  • 15
    • 84944896938 scopus 로고    scopus 로고
    • An ASIC implementation of the AES SBoxes
    • Bart Preneel, editor, Topics in Cryptology - CT-RSA 2002. Springer
    • Johannes Wolkerstorfer, Elisabeth Oswald, and Mario Lamberger. An ASIC implementation of the AES SBoxes. In Bart Preneel, editor, Topics in Cryptology - CT-RSA 2002, volume 2271 of Lecture Notes in Computer Science, pages 67-78. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2271 , pp. 67-78
    • Wolkerstorfer, J.1    Oswald, E.2    Lamberger, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.