메뉴 건너뛰기




Volumn 3, Issue 1, 2004, Pages 92-113

Design of Secure Cryptography Against the Threat of Power-Attacks in DSP-Embedded Processors

Author keywords

Design; Microprocessor Microcomputer Application; Performance; Security; Smartcards; VLIW

Indexed keywords


EID: 27944472807     PISSN: 15399087     EISSN: 15583465     Source Type: Journal    
DOI: 10.1145/972627.972632     Document Type: Article
Times cited : (14)

References (28)
  • 1
    • 84937438279 scopus 로고    scopus 로고
    • Power analysis, what is now possible
    • Lecture Notes in Computer Science
    • Akkar, M., Bevan, R., Dischamp, P., Moyart, D., 2000. Power analysis, what is now possible In ASIACRYPT2000. Lecture Notes in Computer Science, vol. 1976, 489-502.
    • (2000) ASIACRYPT2000. , vol.1976 , pp. 489-502
    • Akkar, M.1    Bevan, R.2    Dischamp, P.3    Moyart, D.4
  • 3
    • 0012022904 scopus 로고    scopus 로고
    • A cautionary note regarding the evaluation of AES candidates on smart cards
    • Chari, S., Jutla, C., Rao, J., Rohtagi, P., 1999. A cautionary note regarding the evaluation of AES candidates on smart cards. In 2nd AES Candidate Conference, 133-147.
    • (1999) 2nd AES Candidate Conference , pp. 133-147
    • Chari, S.1    Jutla, C.2    Rao, J.3    Rohtagi, P.4
  • 4
    • 0000267548 scopus 로고
    • Sequences of numbers generated by addition in formal groups and new primality and factorization tests
    • Chudnovsky, D. V., Chudnovsky, G. V., 1986. Sequences of numbers generated by addition in formal groups and new primality and factorization tests. Applied Mathematics 7, 385-434.
    • (1986) Applied Mathematics , vol.7 , pp. 385-434
    • Chudnovsky, D.V.1    Chudnovsky, G.V.2
  • 5
    • 68549099548 scopus 로고    scopus 로고
    • Differential power analysis in the presence of hardware countermeasures
    • Lecture Notes in Computer Science
    • Clavier, C., Coron, J., Dabbous, N., 2000. Differential power analysis in the presence of hardware countermeasures. In Proceedings of CHES'00. Lecture Notes in Computer Science, vol. 1965, 252-263.
    • (2000) Proceedings of CHES'00. , vol.1965 , pp. 252-263
    • Clavier, C.1    Coron, J.2    Dabbous, N.3
  • 6
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • Lecture Notes in Computer Science
    • Coron, J., 1999. Resistance against differential power analysis for elliptic curve cryptosystems. In CHES'99. Lecture Notes in Computer Science, vol. 1717, 292-302.
    • (1999) CHES'99. , vol.1717 , pp. 292-302
    • Coron, J.1
  • 7
    • 0036705048 scopus 로고    scopus 로고
    • A network flow approach to memory bandwidth utilization in embedded DSP core processors
    • Gebotys, C. H., 2002. A network flow approach to memory bandwidth utilization in embedded DSP core processors. IEEE Transactions on VLSI Systems 10, 4, 390-398.
    • (2002) IEEE Transactions on VLSI Systems , vol.10 , Issue.4 , pp. 390-398
    • Gebotys, C.H.1
  • 10
    • 0012525001 scopus 로고    scopus 로고
    • Software implementation of elliptic curve cryptography over prime fields
    • White Paper
    • Hankerson, D., Hernandez, J., Menezes, A., 2000. Software implementation of elliptic curve cryptography over prime fields. White Paper.
    • (2000)
    • Hankerson, D.1    Hernandez, J.2    Menezes, A.3
  • 11
    • 0012525001 scopus 로고    scopus 로고
    • Software implementation of elliptic curve cryptography over binary fields
    • White Paper
    • Hankerson, D., Hernandez, J., Menezes, A., 2000. Software implementation of elliptic curve cryptography over binary fields. White Paper.
    • (2000)
    • Hankerson, D.1    Hernandez, J.2    Menezes, A.3
  • 13
    • 35248835491 scopus 로고    scopus 로고
    • DPA countermeasures by improving the window method
    • Itoh, K., Yajima, J., Takenaka, M., Torii, N., 2000. DPA countermeasures by improving the window method. In CHES 00, 304-319.
    • (2000) CHES , pp. 304-319
    • Itoh, K.1    Yajima, J.2    Takenaka, M.3    Torii, N.4
  • 14
    • 0141890488 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Kocher, P., 1998. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Lecture Notes in Computer Science, vol. 1998.
    • (1998) Lecture Notes in Computer Science
    • Kocher, P.1
  • 15
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Kocher, P., Jaffe, J., Jun, B., 1999. Differential power analysis. In CYPTOVO, 388-397.
    • (1999) CYPTOVO , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 16
    • 84944898712 scopus 로고    scopus 로고
    • Preventing SPA/DPA in ECC systems using the Jacobi form
    • Liardet, P., Smart, N., 2001. Preventing SPA/DPA in ECC systems using the Jacobi form. Lecture Notes in Computer Science, vol. 2162, 391-401.
    • (2001) Lecture Notes in Computer Science , vol.2162 , pp. 391-401
    • Liardet, P.1    Smart, N.2
  • 20
    • 68549099555 scopus 로고    scopus 로고
    • Using second-order power analysis to attack DPA resistant software
    • Messerges, T., 2000. Using second-order power analysis to attack DPA resistant software. In Proceedings of CHES. Lecture Notes in Computer Science, vol. 1965, 238-251.
    • (2000) Proceedings of CHES. Lecture Notes in Computer Science , vol.1965 , pp. 238-251
    • Messerges, T.1
  • 22
    • 0036631151 scopus 로고    scopus 로고
    • Current dynamics based macro-model for power simulation in a complex VLIW DSP processor
    • Muresan, R., Gebotys, C. H., 2002. Current dynamics based macro-model for power simulation in a complex VLIW DSP processor. IEE Proceedings-Computers and Digital Techniques 14V, 4, 173-187.
    • (2002) IEE Proceedings-Computers and Digital Techniques 14V , vol.4 , pp. 173-187
    • Muresan, R.1    Gebotys, C.H.2
  • 27
    • 0028711545 scopus 로고
    • Power analysis of embedded software: A first step towards software power minimization
    • Tiwari, V., Malik, S., Wolfe, A., 1994. Power analysis of embedded software: A first step towards software power minimization. IEEE Trans. VLSI 2, 4.
    • (1994) IEEE Trans. VLSI , vol.2 , pp. 4
    • Tiwari, V.1    Malik, S.2    Wolfe, A.3
  • 28
    • 85024252375 scopus 로고    scopus 로고
    • Segment-wise timing and power measurement in software emulation
    • Wolf, F., Kruse, J., Ernst, R., 2000. Segment-wise timing and power measurement in software emulation. In Designers Forum DATE.
    • (2000) Designers Forum DATE.
    • Wolf, F.1    Kruse, J.2    Ernst, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.