메뉴 건너뛰기




Volumn 2, Issue , 2004, Pages 546-552

Power-analysis attack on an ASIC AES implementation

Author keywords

AES; Power analysis attack

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; CORRELATION METHODS; INFORMATION ANALYSIS; MICROCONTROLLERS; SCHEDULING;

EID: 3042545023     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/itcc.2004.1286711     Document Type: Conference Paper
Times cited : (211)

References (13)
  • 1
    • 84943615552 scopus 로고    scopus 로고
    • An implementation of DES and AES, secure against some attacks
    • Ç. K. Koç, D. Naccache, and C. Paar, editors, number 2162 in Lecture Notes in Computer Science, Paris, France, May 13-16. Springer-Verlag
    • M.-L. Akkar and C. Giraud. An implementation of DES and AES, secure against some attacks. In Ç. K. Koç, D. Naccache, and C. Paar, editors, Proceedings of 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 2162 in Lecture Notes in Computer Science, pages 309-318, Paris, France, May 13-16 2001. Springer-Verlag.
    • (2001) Proceedings of 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES) , pp. 309-318
    • Akkar, M.-L.1    Giraud, C.2
  • 4
    • 84957079591 scopus 로고    scopus 로고
    • Towards sound approaches to counteract power-analysis attacks
    • M. Wiener, editor, number 1666 in Lecture Notes in Computer Science, Santa Barbara, CA, USA, August 15-19. Springer-Verlag
    • S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi. Towards sound approaches to counteract power-analysis attacks. In M. Wiener, editor, Advances in Cryptology: Proceedings of CRYPTO'99, number 1666 in Lecture Notes in Computer Science, pages 398-412, Santa Barbara, CA, USA, August 15-19 1999. Springer-Verlag.
    • (1999) Advances in Cryptology: Proceedings of CRYPTO'99 , pp. 398-412
    • Chari, S.1    Jutla, C.S.2    Rao, J.R.3    Rohatgi, P.4
  • 6
    • 35248830819 scopus 로고    scopus 로고
    • Multiplicative masking and power anaylsis of AES
    • B. S. Kaliski Jr., Ç. K. Koç, and C. Paar, editors, number 2535 in Lecture Notes in Computer Science, Redwood Shores, CA, USA, August 13-15. Springer-Verlag
    • J. D. Golic̀ and C. Tymen. Multiplicative masking and power anaylsis of AES. In B. S. Kaliski Jr., Ç. K. Koç, and C. Paar, editors, Proceedings of 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 2535 in Lecture Notes in Computer Science, pages 198-212, Redwood Shores, CA, USA, August 13-15 2002. Springer-Verlag.
    • (2002) Proceedings of 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES) , pp. 198-212
    • Golic̀, J.D.1    Tymen, C.2
  • 8
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems
    • N. Koblitz, editor, number 1109 in Lecture Notes in Computer Science, Santa Barbara, CA, USA, August 18-22. Springer-Verlag
    • P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems. In N. Koblitz, editor, Advances in Cryptology: Proceedings of CRYPTO'96, number 1109 in Lecture Notes in Computer Science, pages 104-113, Santa Barbara, CA, USA, August 18-22 1996. Springer-Verlag.
    • (1996) Advances in Cryptology: Proceedings of CRYPTO'96 , pp. 104-113
    • Kocher, P.1
  • 9
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • M. Wiener, editor, number 1666 in Lecture Notes in Computer Science, Santa Barbara, CA, USA, August 15-19. Springer-Verlag
    • P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In M. Wiener, editor, Advances in Cryptology: Proceedings of CRYPTO'99, number 1666 in Lecture Notes in Computer Science, pages 388-397, Santa Barbara, CA, USA, August 15-19 1999. Springer-Verlag.
    • (1999) Advances in Cryptology: Proceedings of CRYPTO'99 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 10
    • 35248892041 scopus 로고    scopus 로고
    • A simple power-analysis attack (SPA) attack on implementations of the AES key expansion
    • P. J. Lee and C. H. Lim, editors, number 2587 in Lecture Notes in Computer Science, Seoul, Korea, November. Springer-Verlag
    • S. Mangard. A simple power-analysis attack (SPA) attack on implementations of the AES key expansion. In P. J. Lee and C. H. Lim, editors, Proceedings of 5th International Conference on Information Security and Crytography (ICISC), number 2587 in Lecture Notes in Computer Science, pages 343-358, Seoul, Korea, November 2002. Springer-Verlag.
    • (2002) Proceedings of 5th International Conference on Information Security and Crytography (ICISC) , pp. 343-358
    • Mangard, S.1
  • 12
    • 3042634267 scopus 로고    scopus 로고
    • October reaffirmed
    • National Institute of Standards and Technology. FIPS 46-3: Data Encryption Standard, October reaffirmed 1999.
    • (1999) FIPS 46-3: Data Encryption Standard
  • 13
    • 35248890508 scopus 로고    scopus 로고
    • Simplified adaptive multiplicative masking for AES
    • B. S. Kaliski Jr., Ç. K. Koç, and C. Paar, editors, number 2535 in Lecture Notes in Computer Science, Redwood Shores, CA, USA, August 13-15. Springer-Verlag
    • E. Trichina, D. De Seta, and L. Germani. Simplified adaptive multiplicative masking for AES. In B. S. Kaliski Jr., Ç. K. Koç, and C. Paar, editors, Proceedings of 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 2535 in Lecture Notes in Computer Science, pages 187-197, Redwood Shores, CA, USA, August 13-15 2002. Springer-Verlag.
    • (2002) Proceedings of 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES) , pp. 187-197
    • Trichina, E.1    De Seta, D.2    Germani, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.