메뉴 건너뛰기




Volumn 3329, Issue , 2004, Pages 451-467

The Davies-Murphy power attack

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 26444527390     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30539-2_32     Document Type: Article
Times cited : (8)

References (21)
  • 1
    • 84937438279 scopus 로고    scopus 로고
    • Power Analysis, What Is Now Possible
    • T. Okamoto, editor, Advances in Cryptology - Asiacrypt'00, Springer
    • M.-L. Akkar, R. Bevan, P. Dischamp, and D. Moyart. Power Analysis, What Is Now Possible ... In T. Okamoto, editor, Advances in Cryptology - Asiacrypt'00, volume 1976 of Lectures Notes in Computer Science, pages 489-502. Springer, 2000.
    • (2000) Lectures Notes in Computer Science , vol.1976 , pp. 489-502
    • Akkar, M.-L.1    Bevan, R.2    Dischamp, P.3    Moyart, D.4
  • 2
    • 35048866271 scopus 로고    scopus 로고
    • Two Power Analysis Attacks against One-Mask Methods
    • B. Roy and W. Meier, editors, Pre-proceedings Version
    • M.-L. Akkar, R. Bevan, and L. Goubin. Two Power Analysis Attacks against One-Mask Methods. In B. Roy and W. Meier, editors, Fast Software Encryption - 2004, pages 308-325, 2004. Pre-proceedings Version.
    • (2004) Fast Software Encryption - 2004 , pp. 308-325
    • Akkar, M.-L.1    Bevan, R.2    Goubin, L.3
  • 3
    • 84943615552 scopus 로고    scopus 로고
    • An Implementation of DES and AES Secure against Some Attacks
    • Ç. Koç, D. Naccache, and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES), Springer
    • M.-L. Akkar and C. Giraud. An Implementation of DES and AES Secure against Some Attacks. In Ç. Koç, D. Naccache, and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES), volume 2162 of Lectures Notes in Computer Science, pages 309-318. Springer, 2001.
    • (2001) Lectures Notes in Computer Science , vol.2162 , pp. 309-318
    • Akkar, M.-L.1    Giraud, C.2
  • 4
    • 0242571734 scopus 로고    scopus 로고
    • A Generic Protection against High-Order Differential Power Analysis
    • T. Johansson, editor, Fast Software Encryption - 2003, Springer
    • M.-L. Akkar and L. Goubin. A Generic Protection against High-Order Differential Power Analysis. In T. Johansson, editor, Fast Software Encryption - 2003, volume 2887 of Lectures Notes in Computer Science, pages 192-205. Springer, 2003.
    • (2003) Lectures Notes in Computer Science , vol.2887 , pp. 192-205
    • Akkar, M.-L.1    Goubin, L.2
  • 5
    • 0343542925 scopus 로고
    • An Improvement of Davies' Attack on DES
    • A. De Santis, editor, Advances in Cryptology - Eurocrypt'95, Springer
    • E. Biham and A. Biryukov. An Improvement of Davies' Attack on DES. In A. De Santis, editor, Advances in Cryptology - Eurocrypt'95, volume 950 of Lectures Notes in Computer Science, pages 461-467. Springer, 1995.
    • (1995) Lectures Notes in Computer Science , vol.950 , pp. 461-467
    • Biham, E.1    Biryukov, A.2
  • 6
    • 84903595110 scopus 로고
    • Differential Cryptanalysis of DES-like Cryptosystems
    • A. Menezes and S. Vanstone, editors, Advances in Cryptology - Crypto'90, Springer
    • E. Biham and A. Shamir. Differential Cryptanalysis of DES-like Cryptosystems. In A. Menezes and S. Vanstone, editors, Advances in Cryptology - Crypto'90, volume 537 of Lectures Notes in Computer Science, pages 2-21. Springer, 1990.
    • (1990) Lectures Notes in Computer Science , vol.537 , pp. 2-21
    • Biham, E.1    Shamir, A.2
  • 7
    • 0004743521 scopus 로고    scopus 로고
    • Power Analysis of the Key Scheduling of the AES Candidates
    • E. Biham and A. Shamir. Power Analysis of the Key Scheduling of the AES Candidates. In Second AES Candidate Conference, 1999.
    • (1999) Second AES Candidate Conference
    • Biham, E.1    Shamir, A.2
  • 8
    • 0003130498 scopus 로고    scopus 로고
    • On the Importance of Checking Cryptographic Protocols for Faults
    • Extended Abstract. W. Fumy, editor, Advances in Cryptology - Eurocrypt'97, Springer
    • D. Boneh, R. DeMillo, and R. Lipton. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). In W. Fumy, editor, Advances in Cryptology - Eurocrypt'97, volume 1233 of Lectures Notes in Computer Science, pages 37-51. Springer, 1997.
    • (1997) Lectures Notes in Computer Science , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.2    Lipton, R.3
  • 10
    • 68549099548 scopus 로고    scopus 로고
    • Differential Power Analysis in the Presence of Hardware Countermeasures
    • Ç. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES), Springer
    • C. Clavier, J.-S. Coron, and N. Dabbous. Differential Power Analysis in the Presence of Hardware Countermeasures. In Ç. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES), volume 1965 of Lectures Notes in Computer Science, pages 252-263. Springer, 2000.
    • (2000) Lectures Notes in Computer Science , vol.1965 , pp. 252-263
    • Clavier, C.1    Coron, J.-S.2    Dabbous, N.3
  • 11
    • 0029632042 scopus 로고
    • Pairs and Triplets of DES S-Boxes
    • D. Davies and S. Murphy. Pairs and Triplets of DES S-Boxes. Journal of Cryptology, 8(1):1-25, 1995.
    • (1995) Journal of Cryptology , vol.8 , Issue.1 , pp. 1-25
    • Davies, D.1    Murphy, S.2
  • 12
    • 84949520149 scopus 로고    scopus 로고
    • DES and Differential Power Analysis, The "Duplication" Method
    • Ç. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES), Springer
    • L. Goubin and J. Patarin. DES and Differential Power Analysis, The "Duplication" Method. In Ç. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES), volume 1717 of Lectures Notes in Computer Science, pages 158-172. Springer, 1999.
    • (1999) Lectures Notes in Computer Science , vol.1717 , pp. 158-172
    • Goubin, L.1    Patarin, J.2
  • 13
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Others Systems
    • N. Koblitz, editor, Advances in Cryptology - Crypto'96, Springer
    • P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Others Systems. In N. Koblitz, editor, Advances in Cryptology - Crypto'96, volume 1109 of Lectures Notes in Computer Science, pages 104-113. Springer, 1996.
    • (1996) Lectures Notes in Computer Science , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 14
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • M. Wiener, editor, Advances in Cryptology - Crypto'99, Springer
    • P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In M. Wiener, editor, Advances in Cryptology - Crypto'99, volume 1666 of Lectures Notes in Computer Science, pages 388-397. Springer, 1999.
    • (1999) Lectures Notes in Computer Science , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 16
    • 85025704284 scopus 로고
    • Linear Cryptanalysis Method for DES Cipher
    • T. Helleseth, editor, Advances in Cryptology - Eurocrypt'93, Springer
    • M. Matsui. Linear Cryptanalysis Method for DES Cipher. In T. Helleseth, editor, Advances in Cryptology - Eurocrypt'93, volume 765 of Lectures Notes in Computer Science, pages 386-397. Springer, 1993.
    • (1993) Lectures Notes in Computer Science , vol.765 , pp. 386-397
    • Matsui, M.1
  • 17
    • 68549099555 scopus 로고    scopus 로고
    • Using Second-Order Power Analysis to Attack DPA Resistant software
    • Ç. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES), Springer
    • T. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant software. In Ç. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES), volume 1965 of Lectures Notes in Computer Science, pages 238-251. Springer, 2000.
    • (2000) Lectures Notes in Computer Science , vol.1965 , pp. 238-251
    • Messerges, T.1
  • 20
    • 0242571732 scopus 로고    scopus 로고
    • A New Class of Collision Attacks and its Application to DES
    • T. Johansson, editor, Fast Software Encryption - 2003, Springer
    • K. Schramm, T. Wollinger, and C. Paar. A New Class of Collision Attacks and its Application to DES. In T. Johansson, editor, Fast Software Encryption - 2003, volume 2887 of Lectures Notes in Computer Science. Springer, 2003.
    • (2003) Lectures Notes in Computer Science , vol.2887
    • Schramm, K.1    Wollinger, T.2    Paar, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.