메뉴 건너뛰기




Volumn 3659, Issue , 2005, Pages 309-323

Improved higher-order side-channel attacks with FPGA experiments

Author keywords

Block cipher; Cryptographic devices; DPA; FPGA; High order power analysis; Masking countermeasure; Side channel analysis

Indexed keywords

CRYPTOGRAPHY; NUMBER THEORY; SECURITY OF DATA; STATISTICAL METHODS;

EID: 27244438087     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11545262_23     Document Type: Conference Paper
Times cited : (71)

References (25)
  • 1
    • 84943615552 scopus 로고    scopus 로고
    • An implementation of des and AES secure againts some attacks
    • proceedings of CHES 2001, Paris, France, May, Springer-Verlag
    • M.L. Akkar, C. Giraud, An Implementation of DES and AES Secure againts Some Attacks, in the proceedings of CHES 2001, Lecture Notes in Computer Sciences, vol 2162, pp 309-318, Paris, France, May 2001, Springer-Verlag.
    • (2001) Lecture Notes in Computer Sciences , vol.2162 , pp. 309-318
    • Akkar, M.L.1    Giraud, C.2
  • 2
    • 35248896294 scopus 로고    scopus 로고
    • Multi-channel attacks
    • proceedings of CHES 2003, Cologne, Germany, September, Springer-Verlag
    • D. Agrawal, J.R. Rao, P. Rohatgi Multi-channel Attacks, in the proceedings of CHES 2003, Lecture Notes in Computer Sciences, vol 2779, pp 2-16, Cologne, Germany, September 2003, Springer-Verlag.
    • (2003) Lecture Notes in Computer Sciences , vol.2779 , pp. 2-16
    • Agrawal, D.1    Rao, J.R.2    Rohatgi, P.3
  • 5
    • 35048818034 scopus 로고    scopus 로고
    • Correlation power analysis with a leakage model
    • the proceedings of CHES 2004, Boston, USA, August
    • E. Brier, C. Clavier, F. Olivier, Correlation Power Analysis with a Leakage Model, in the proceedings of CHES 2004, Lecture Notes in Computer Science, vol 3156, pp 16-29, Boston, USA, August 2004.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 16-29
    • Brier, E.1    Clavier, C.2    Olivier, F.3
  • 6
    • 84957079591 scopus 로고    scopus 로고
    • Towards sound approaches to counteract power-analysis attacks
    • the proceedings of Crypto 1999, Santa Barbara, California, USA, August, Springer-Verlag
    • S. Chari C. Jutla, J. Rao, P. Rohatgi, Towards Sound Approaches to Counteract Power-Analysis Attacks, in the proceedings of Crypto 1999, Lecture Notes in Computer Science, vol 1666, pp 398-412, Santa Barbara, California, USA, August 1999, Springer-Verlag.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 398-412
    • Chari, S.1    Jutla, C.2    Rao, J.3    Rohatgi, P.4
  • 7
    • 84949520149 scopus 로고    scopus 로고
    • DES and differential power analysis
    • the proceedings of CHES 1999, Worcester, Massachussets, USA, August, Springer-Verlag
    • L. Goubin, J. Patarin, DES and Differential Power Analysis, in the proceedings of CHES 1999, Lecture Notes in Computer Science, vol 1717, pp 158-172, Worcester, Massachussets, USA, August 1999, Springer-Verlag.
    • (1999) Lecture Notes in Computer Science , vol.1717 , pp. 158-172
    • Goubin, L.1    Patarin, J.2
  • 8
    • 35248868313 scopus 로고    scopus 로고
    • Hidden markov model cryptanalysis
    • the proceedings of CHES 2003, Cologne, Germany, September, Springer-Verlag
    • C. Karlof, D. Wagner, Hidden Markov Model Cryptanalysis, in the proceedings of CHES 2003, Lecture Notes in Computer Sciences, vol 2779, pp 17-30, Cologne, Germany, September 2003, Springer-Verlag.
    • (2003) Lecture Notes in Computer Sciences , vol.2779 , pp. 17-30
    • Karlof, C.1    Wagner, D.2
  • 9
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • the proceedings of CRYPTO 99, Santa Barbara, USA, August, Springer-Verlag
    • P. Kocher, J. Jaffe, B. Jun, Differential Power Analysis, in the proceedings of CRYPTO 99, Lecture Notes in Computer Science, vol 1666, pp 398-412, Santa Barbara, USA, August 1999, Springer-Verlag.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 398-412
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 10
    • 24144459808 scopus 로고    scopus 로고
    • Side-channel leakage of masked CMOS gates
    • the proceedings of CT-RSA 05, San Fransisco, CA, USA, February
    • S.Mangard, Side-Channel Leakage of Masked CMOS Gates, in the proceedings of CT-RSA 05, Lecture Notes in Computer Science, vol 3376, pp 351-365, San Fransisco, CA, USA, February 2005.
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 351-365
    • Mangard, S.1
  • 12
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • May
    • T.S. Messerges, E.A. Dabbish, R.H. Sloan, Examining Smart-Card Security under the Threat of Power Analysis Attacks, IEEE Transactions on Computers, vol 51, num 5, pp 541-552, May 2002.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 13
    • 68549099555 scopus 로고    scopus 로고
    • Using second-order power analysis to attack DPA resistant software
    • the proceedings of CHES 2000, Worcester, Massachusetts, USA, August, Springer-Verlag
    • T.S. Messerges, Using Second-Order Power Analysis to Attack DPA Resistant Software, in the proceedings of CHES 2000, Lecture Notes in Computer Sciences, vol 1965, pp 71-77, Worcester, Massachusetts, USA, August 2000, Springer-Verlag.
    • (2000) Lecture Notes in Computer Sciences , vol.1965 , pp. 71-77
    • Messerges, T.S.1
  • 14
    • 34248682000 scopus 로고
    • FIPS PUB 46, the data encryption standard
    • NIST, U.S. Dept. of Commerce, Jan
    • National Bureau of Standards, FIPS PUB 46, The Data Encryption Standard, Federal Information Processing Standard, NIST, U.S. Dept. of Commerce, Jan 1977.
    • (1977) Federal Information Processing Standard
  • 15
    • 0003508558 scopus 로고    scopus 로고
    • FIPS 197, advanced encryption standard
    • NIST, U.S. Dept. of Commerce, November
    • National Bureau of Standards, FIPS 197, Advanced Encryption Standard, Federal Information Processing Standard, NIST, U.S. Dept. of Commerce, November 2001.
    • (2001) Federal Information Processing Standard
  • 20
    • 24744465637 scopus 로고    scopus 로고
    • Power analysis of an FPGA implementation of Rijndael: Is pipelining a DPA countermeasure?
    • proceedings of CHES 2004, Boston, USA, August
    • F.-X. Standaert, S.B. Ors, B. Preneel, Power Analysis of an FPGA Implementation of Rijndael: is Pipelining a DPA Countermeasure?, in the proceedings of CHES 2004, Lecture Notes in Computer Science, vol 3156, pp 30-44, Boston, USA, August 2004.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 30-44
    • Standaert, F.-X.1    Ors, S.B.2    Preneel, B.3
  • 21
    • 24744434942 scopus 로고    scopus 로고
    • On the masking countermeasure and higher-order power analysis attacks
    • Las Vegas, USA, April
    • F.-X. Standart, E. Peeters, J.-J. Quisquater, On the Masking Countermeasure and Higher-Order Power Analysis Attacks, in the proceedings of ITCC 2005 (vol 1), pp 562-567, Las Vegas, USA, April 2005.
    • (2005) Proceedings of ITCC 2005 , vol.1 , pp. 562-567
    • Standart, F.-X.1    Peeters, E.2    Quisquater, J.-J.3
  • 23
    • 0036990404 scopus 로고    scopus 로고
    • Variance estimation and ranking of Gaussian Mixture Distributions in target tracking applications
    • Las Vegas, NV, December
    • L. Trailovic, L.Y. Pao, Variance Estimation and Ranking of Gaussian Mixture Distributions in Target Tracking Applications, in the proceedings of the IEEE Conference on Decision and Control, pp 2195-2201, Las Vegas, NV, December 2002.
    • (2002) Proceedings of the IEEE Conference on Decision and Control , pp. 2195-2201
    • Trailovic, L.1    Pao, L.Y.2
  • 24
    • 35048870686 scopus 로고    scopus 로고
    • Towards efficient second-order power analysis
    • proceedings of CHES 2004, Boston, USA, August
    • J. Waddle, D. Wagner, Towards Efficient Second-Order Power Analysis, in the proceedings of CHES 2004, Lecture Notes in Computer Science, vol 3156, pp 1-15, Boston, USA, August 2004.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 1-15
    • Waddle, J.1    Wagner, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.