메뉴 건너뛰기




Volumn 3659, Issue , 2005, Pages 157-171

Successfully attacking masked AES hardware implementations

Author keywords

AES; ASIC; DPA; Masking; Power Analysis

Indexed keywords

APPLICATION SPECIFIC INTEGRATED CIRCUITS; COMPUTER SIMULATION; CRYPTOGRAPHY; INFORMATION ANALYSIS; LOGIC GATES; MICROPROCESSOR CHIPS; SECURITY OF DATA;

EID: 27244451021     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11545262_12     Document Type: Conference Paper
Times cited : (300)

References (19)
  • 1
    • 35048848006 scopus 로고    scopus 로고
    • Two power analysis attacks against one-mask methods
    • Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers. Springer
    • Mehdi-Laurent Akkar, Régis Bevan, and Louis Goubin. Two Power Analysis Attacks against One-Mask Methods. In Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, volume 3017 of Lecture Notes in Computer Science, pages 332-347. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3017 , pp. 332-347
    • Akkar, M.-L.1    Bevan, R.2    Goubin, L.3
  • 2
    • 84943615552 scopus 로고    scopus 로고
    • An implementation of DES and AES, secure against some attacks
    • Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings. Springer
    • Mehdi-Laurent Akkar and Christophe Giraud. An Implementation of DES and AES, Secure against Some Attacks. In Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, volume 2162 of Lecture Notes in Computer Science, pages 309-318. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2162 , pp. 309-318
    • Akkar, M.-L.1    Giraud, C.2
  • 3
    • 35048848490 scopus 로고    scopus 로고
    • Provably secure masking of AES
    • Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers. Springer
    • Johannes Blömer, Jorge Guajardo, and Volker Krummel. Provably Secure Masking of AES. In Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers, volume 3357 of Lecture Notes in Computer Science, pages 69-83. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3357 , pp. 69-83
    • Blömer, J.1    Guajardo, J.2    Krummel, V.3
  • 4
    • 35248899532 scopus 로고    scopus 로고
    • Template attacks
    • Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers. Springer
    • Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi. Template Attacks. In Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, volume 2535 of Lecture Notes in Computer Science, pages 13-28. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2535 , pp. 13-28
    • Chari, S.1    Rao, J.R.2    Rohatgi, P.3
  • 6
    • 35248830819 scopus 로고    scopus 로고
    • Multiplicative masking and power analysis of AES
    • Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers. Springer
    • Jovan D. Golić and Christophe Tymen. Multiplicative Masking and Power Analysis of AES. In Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, volume 2535 of Lecture Notes in Computer Science, pages 198-212. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2535 , pp. 198-212
    • Golić, J.D.1    Tymen, C.2
  • 7
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings. Springer
    • Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power Analysis. In Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 8
    • 24144459808 scopus 로고    scopus 로고
    • Side-channel leakage of masked CMOS gates
    • Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings. Springer
    • Stefan Mangard, Thomas Popp, and Berndt M. Gammel. Side-Channel Leakage of Masked CMOS Gates. In Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, volume 3376 of Lecture Notes in Computer Science, pages 351-365. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 351-365
    • Mangard, S.1    Popp, T.2    Gammel, B.M.3
  • 9
    • 68549099555 scopus 로고    scopus 로고
    • Using second-order power analysis to attack DPA resistant software
    • Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings. Springer
    • Thomas S. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, volume 1965 of Lecture Notes in Computer Science, pages 238-251. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1965 , pp. 238-251
    • Messerges, T.S.1
  • 10
    • 3042644992 scopus 로고    scopus 로고
    • November
    • National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard, November 2001. Available online at http://www.itl.nist. gov/fipspubs/.
    • (2001) FIPS-197: Advanced Encryption Standard
  • 12
    • 26444465110 scopus 로고    scopus 로고
    • A side-channel analysis resistant description of the AES S-box
    • Fast Software Encryption, 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Proceedings, Springer
    • Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, and Vincent Rijmen. A Side-Channel Analysis Resistant Description of the AES S-box. In Fast Software Encryption, 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Proceedings, volume 3557 of Lecture Notes in Computer Science, Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3557
    • Oswald, E.1    Mangard, S.2    Pramstaller, N.3    Rijmen, V.4
  • 17
    • 35248890508 scopus 로고    scopus 로고
    • Simplified adaptive multiplicative masking for AES
    • Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers. Springer
    • Elena Trichina, Domenico De Seta, and Lucia Germani. Simplified Adaptive Multiplicative Masking for AES. In Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, volume 2535 of Lecture Notes in Computer Science, pages 187-197. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2535 , pp. 187-197
    • Trichina, E.1    De Seta, D.2    Germani, L.3
  • 18
    • 35048870686 scopus 로고    scopus 로고
    • Towards efficient second-order power analysis
    • Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 11-13, 2004, Proceedings. Springer
    • Jason Waddle and David Wagner. Towards Efficient Second-Order Power Analysis. In Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 11-13, 2004, Proceedings, volume 3156 of Lecture Notes in Computer Science, pages 1-15. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 1-15
    • Waddle, J.1    Wagner, D.2
  • 19
    • 84944896938 scopus 로고    scopus 로고
    • An ASIC implementation of the AES SBoxes
    • Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002. Springer
    • Johannes Wolkerstorfer, Elisabeth Oswald, and Mario Lamberger. An ASIC implementation of the AES SBoxes. In Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002, volume 2271 of Lecture Notes in Computer Science, pages 67-78. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2271 , pp. 67-78
    • Wolkerstorfer, J.1    Oswald, E.2    Lamberger, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.