메뉴 건너뛰기




Volumn 3531, Issue , 2005, Pages 393-406

SCARE of the DES (Side Channel Analysis for Reverse Engineering of the Data Encryption Standard)

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; DATA REDUCTION; INFORMATION ANALYSIS; REVERSE ENGINEERING; SECURITY OF DATA; SMART CARDS;

EID: 26444614207     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11496137_27     Document Type: Conference Paper
Times cited : (34)

References (10)
  • 1
    • 84958641478 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • B. Kaliski, editor, Advances in Cryptology - Crypto'97. Springer
    • E. Biham and A. Shamir. Differential Fault Analysis of Secret Key Cryptosystems. In B. Kaliski, editor, Advances in Cryptology - Crypto'97, volume 1294 of Lectures Notes in Computer Science, pages 513-525. Springer, 1997.
    • (1997) Lectures Notes in Computer Science , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 2
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • W. Fumy, editor, Advances in Cryptology - Eurocrypt'97. Springer
    • D. Boneh, R. DeMillo, and R. Lipton. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). In W. Fumy, editor, Advances in Cryptology - Eurocrypt'97, volume 1233 of Lectures Notes in Computer Science, pages 37-51. Springer, 1997.
    • (1997) Lectures Notes in Computer Science , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.2    Lipton, R.3
  • 4
    • 33845395407 scopus 로고    scopus 로고
    • Side Channel Analysis for Reverse Engineering (SCARE) - An improved attack against a secret A3/A8 GSM algorithm
    • Christophe Clavier. Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm. Cryptology ePrint Archive, Report 2004/049, 2004. http://eprint.iacr.org/.
    • (2004) Cryptology ePrint Archive, Report , vol.2004 , Issue.49
    • Clavier, C.1
  • 5
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic analysis: Concret results
    • Ç. Koç, D. Naccache, and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CUES) - 2001. Springer
    • K. Gandolfi, C. Mourtel, and F. Olivier. Electromagnetic Analysis: Concret Results. In Ç. Koç, D. Naccache, and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CUES) - 2001, volume 2162 of Lectures Notes in Computer Science, pages 251-261. Springer, 2001.
    • (2001) Lectures Notes in Computer Science , vol.2162 , pp. 251-261
    • Gandolfi, K.1    Mourtel, C.2    Olivier, F.3
  • 6
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and others systems
    • N. Koblitz, editor, Advances in Cryptology - Crypto'96. Springer
    • P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Others Systems. In N. Koblitz, editor, Advances in Cryptology - Crypto'96, volume 1109 of Lectures Notes in Computer Science, pages 104-113. Springer, 1996.
    • (1996) Lectures Notes in Computer Science , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 7
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • M. Wiener, editor, Advances in Cryptology - Crypto '99, Springer
    • P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In M. Wiener, editor, Advances in Cryptology - Crypto '99, volume 1666 of Lectures Notes in Computer Science, pages 388-397. Springer, 1999.
    • (1999) Lectures Notes in Computer Science , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 8
    • 26444527390 scopus 로고    scopus 로고
    • The Davies-Murphy power attack
    • P.-J. Lee, editor, Advances in Cryptology - Asiacrypt'04. Springer
    • S. Kunz-Jacques, F. Muller, and F. Valette. The Davies-Murphy Power Attack. In P.-J. Lee, editor, Advances in Cryptology - Asiacrypt'04, volume 3329 of Lectures Notes in Computer Science, pages 451-467. Springer, 2004.
    • (2004) Lectures Notes in Computer Science , vol.3329 , pp. 451-467
    • Kunz-Jacques, S.1    Muller, F.2    Valette, F.3
  • 9
    • 0242372122 scopus 로고    scopus 로고
    • Side-channel attacks on substitution blocks
    • J. Zhou, M. Yung, and Y. Han, editors, Applied Cryptography and Network Security (ACNS) 2003. Springer
    • R. Novak. Side-Channel Attacks on Substitution Blocks. In J. Zhou, M. Yung, and Y. Han, editors, Applied Cryptography and Network Security (ACNS) 2003, volume 2846 of Lectures Notes in Computer Science, pages 307-318. Springer, 2003.
    • (2003) Lectures Notes in Computer Science , vol.2846 , pp. 307-318
    • Novak, R.1
  • 10
    • 26444581675 scopus 로고    scopus 로고
    • October
    • National Institute of Standards and Technology (NIST). Data Encryption Standard (DES) FIPS Publication 46-3, October 1999. Available at http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf.
    • (1999) Data Encryption Standard (DES) FIPS Publication , vol.46 , Issue.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.