메뉴 건너뛰기




Volumn 3796 LNCS, Issue , 2005, Pages 233-247

On the automatic construction of indistinguishable operations

Author keywords

Countermeasures; Indistinguishable Operations; Side channel Cryptanalysis; Simple Power Analysis

Indexed keywords

AUTOMATION; COMPUTATIONAL COMPLEXITY; COMPUTATIONAL METHODS; ERRORS; FUNCTIONS; INFORMATION RETRIEVAL; SECURITY OF DATA;

EID: 33646826538     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11586821_16     Document Type: Conference Paper
Times cited : (10)

References (21)
  • 3
    • 33646833725 scopus 로고    scopus 로고
    • On the automatic construction of indistinguishable operations
    • Report 2005/174
    • M. Barbosa and D. Page. On the Automatic Construction of Indistinguishable Operations. In Cryptology ePrint Archive, Report 2005/174, 2005.
    • (2005) Cryptology ePrint Archive
    • Barbosa, M.1    Page, D.2
  • 6
    • 84958979095 scopus 로고    scopus 로고
    • Weierstraß elliptic curves and side-channel attacks
    • Springer-Verlag LNCS 2274
    • É. Brier and M. Joye. Weierstraß Elliptic Curves and Side-channel Attacks. In Public Key Cryptography (PKC), Springer-Verlag LNCS 2274, 335-345, 2002.
    • (2002) Public Key Cryptography (PKC) , pp. 335-345
    • Brier, É.1    Joye, M.2
  • 7
    • 3042527150 scopus 로고    scopus 로고
    • Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
    • B. Chevallier-Mames, M. Ciet and M. Joye. Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity. In IEEE Transactions on Computers, 53(6), 760-768, 2004.
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.6 , pp. 760-768
    • Chevallier-Mames, B.1    Ciet, M.2    Joye, M.3
  • 8
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • Springer-Verlag LNCS 1717
    • J-S. Coron. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In Cryptographic Hardware and Embedded Systems (CHES), Springer-Verlag LNCS 1717, 292-302, 1999.
    • (1999) Cryptographic Hardware and Embedded Systems (CHES) , pp. 292-302
    • Coron, J.-S.1
  • 10
    • 25144482720 scopus 로고
    • Threshold accepting: A general purpose optimization algorithm appearing superior to simulated annealing
    • G. Dueck and T. Scheuer. Threshold Accepting: A General Purpose Optimization Algorithm Appearing Superior to Simulated Annealing. In Journal of Computational Physics, 90(1), 161-175, 1990.
    • (1990) Journal of Computational Physics , vol.90 , Issue.1 , pp. 161-175
    • Dueck, G.1    Scheuer, T.2
  • 12
    • 35248815162 scopus 로고    scopus 로고
    • Secure elliptic curve implementations: An analysis of resistance to power-attacks in a DSP processor
    • Springer-Verlag LNCS 2523
    • C.H. Gebotys and R.J. Gebotys. Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor. In Cryptographic Hardware and Embedded Systems (CHES), Springer-Verlag LNCS 2523, 114-128, 2002.
    • (2002) Cryptographic Hardware and Embedded Systems (CHES) , pp. 114-128
    • Gebotys, C.H.1    Gebotys, R.J.2
  • 15
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • Springer-Verlag LNCS 1109
    • P.C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Advances in Cryptology (CRYPTO), Springer-Verlag LNCS 1109, 104-113, 1996.
    • (1996) Advances in Cryptology (CRYPTO) , pp. 104-113
    • Kocher, P.C.1
  • 17
    • 21744445228 scopus 로고    scopus 로고
    • Efficient arithmetic on genus 2 hyperelliptic curves over finite fields via explicit formulae
    • Report 2002/121
    • T. Lange. Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae. In Cryptology ePrint Archive, Report 2002/121, 2002.
    • (2002) Cryptology EPrint Archive
    • Lange, T.1
  • 20
    • 24144499349 scopus 로고    scopus 로고
    • On XTR and side-channel analysis
    • Springer-Verlag LNCS 3357
    • D. Page and M. Stam. On XTR and Side-Channel Analysis. In Selected Areas in Cryptography (SAC), Springer-Verlag LNCS 3357, 54-68, 2004.
    • (2004) Selected Areas in Cryptography (SAC) , pp. 54-68
    • Page, D.1    Stam, M.2
  • 21
    • 24744463146 scopus 로고    scopus 로고
    • Implementation of elliptic curve cryptography with built-in counter measures against side channel attacks
    • Springer-Verlag LNCS 2523
    • E. Trichina and A. Bellezza. Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks. In Cryptographic Hardware and Embedded Systems (CHES), Springer-Verlag LNCS 2523, 98-113, 2002.
    • (2002) Cryptographic Hardware and Embedded Systems (CHES) , pp. 98-113
    • Trichina, E.1    Bellezza, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.