메뉴 건너뛰기




Volumn 3960 LNCS, Issue , 2006, Pages 208-225

Higher order masking of the AES

Author keywords

AES; Higher Order DPA; Masking Countermeasure

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTER HARDWARE; ELECTRONIC CRIME COUNTERMEASURES; ENGINEERING RESEARCH; SIDE CHANNEL ATTACK;

EID: 33745652931     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11605805_14     Document Type: Conference Paper
Times cited : (168)

References (21)
  • 1
    • 84943615552 scopus 로고    scopus 로고
    • An implementation of des and AES secure against some attacks
    • Ç. K. Koç, D. Naccache, and C. Paar, editors. Springer-Verlag
    • M.-L. Akkar and C. Giraud. An Implementation of DES and AES Secure against Some Attacks. In Ç. K. Koç, D. Naccache, and C. Paar, editors, Cryptographic Hantware and Embedded Systems - CHES 2001, volume LNCS 2162, pages 309-318. Springer-Verlag, 2001.
    • (2001) Cryptographic Hantware and Embedded Systems - CHES 2001 , vol.LNCS 2162 , pp. 309-318
    • Akkar, M.-L.1    Giraud, C.2
  • 2
    • 0242571734 scopus 로고    scopus 로고
    • A generic protection against high-order differential power analysis
    • T. Johansson, editor. Springer-Verlag
    • M.-L. Akkar and L. Goubin. A Generic Protection against High-Order Differential Power Analysis. In T. Johansson, editor, Fast Software Encryption - FSE 2003, volume 2887, pages 192-205. Springer-Verlag, 2003.
    • (2003) Fast Software Encryption - FSE 2003 , vol.2887 , pp. 192-205
    • Akkar, M.-L.1    Goubin, L.2
  • 3
    • 84937438279 scopus 로고    scopus 로고
    • Power analysis, what is now possible
    • Tatsuaki Okamoto, editor. Springer
    • Mehdi-Laurent Akkar, Régis Bevan, Paul Dischamp, and Didier Moyart. Power Analysis, What Is Now Possible... In Tatsuaki Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, volume LNCS 1976, pages 489-502. Springer, 2000.
    • (2000) Advances in Cryptology - ASIACRYPT 2000 , vol.LNCS 1976 , pp. 489-502
    • Akkar, M.-L.1    Bevan, R.2    Dischamp, P.3    Moyart, D.4
  • 4
    • 35048848490 scopus 로고    scopus 로고
    • Provably secure masking of AES
    • H. Handschuh and M. Anwar Hasan, editors. Springer-Verlag, August
    • J. Blömer, J. Guajardo, and V. Krummel. Provably Secure Masking of AES. In H. Handschuh and M. Anwar Hasan, editors, Selected Areas in Cryptography - SAC 2004, volume 3357, pages 69-83. Springer-Verlag, August 2004.
    • (2004) Selected Areas in Cryptography - SAC 2004 , vol.3357 , pp. 69-83
    • Blömer, J.1    Guajardo, J.2    Krummel, V.3
  • 5
    • 35048818034 scopus 로고    scopus 로고
    • Correlation power analysis with a leakage model
    • M. Joye and J.-J. Quisquater, editors. Springer-Verlag
    • E. Brier, C. Clavier, and F. Olivier. Correlation Power Analysis with a Leakage Model. In M. Joye and J.-J. Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, volume 3156, pages 16-29. Springer-Verlag, 2004.
    • (2004) Cryptographic Hardware and Embedded Systems - CHES 2004 , vol.3156 , pp. 16-29
    • Brier, E.1    Clavier, C.2    Olivier, F.3
  • 7
    • 84957079591 scopus 로고    scopus 로고
    • Towards sound approaches to counteract power-analysis attacks
    • . Springer-Verlag, August
    • S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi. Towards Sound Approaches to Counteract Power-Analysis Attacks. In Advances in Cryptology - CRYPTO '99, volume LNCS 1666, pages 398-412. Springer-Verlag, August 1999.
    • (1999) Advances in Cryptology - CRYPTO '99 , vol.LNCS 1666 , pp. 398-412
    • Chari, S.1    Jutla, C.S.2    Rao, J.R.3    Rohatgi, P.4
  • 8
    • 68549105908 scopus 로고    scopus 로고
    • On boolean and arithmetic masking against differential power analysis
    • C. K. Koç and C. Paar, editors. Springer-Verlag
    • C. Clavier and J.-S. Coron. On Boolean and Arithmetic Masking against Differential Power Analysis. In C. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, volume LNCS 1965, pages 231-237. Springer-Verlag, 2000.
    • (2000) Cryptographic Hardware and Embedded Systems - CHES 2000 , vol.LNCS 1965 , pp. 231-237
    • Clavier, C.1    Coron, J.-S.2
  • 9
    • 33745660202 scopus 로고    scopus 로고
    • An algebraic masking method to protect AES against power attacks
    • N. T. Courtois and L. Goubin. An Algebraic Masking Method to Protect AES Against Power Attacks, http://eprint.iacr.org/2005/204.pdf, 2005. Cryptology ePrint Archive: Report 2005/204.
    • (2005) Cryptology ePrint Archive: Report , vol.2005 , Issue.204
    • Courtois, N.T.1    Goubin, L.2
  • 11
    • 35248830819 scopus 로고    scopus 로고
    • Multiplicative masking and power analysis of AES
    • B.S. Kaliski, Ç. K. Koç, and C. Paar, editors. Springer-Verlag
    • J. D. Colic and C. Tymen. Multiplicative Masking and Power Analysis of AES. In B.S. Kaliski, Ç. K. Koç, and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, volume 2523, pages 198-212. Springer-Verlag, 2002.
    • (2002) Cryptographic Hardware and Embedded Systems - CHES 2002 , vol.2523 , pp. 198-212
    • Colic, J.D.1    Tymen, C.2
  • 13
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis: Leaking secrets
    • Springer-Verlag
    • P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis: Leaking Secrets. In Advances in Cryptology - CRYPTO '99, volume LNCS 1666, pages 388-397. Springer-Verlag, 1999.
    • (1999) Advances in Cryptology - CRYPTO '99 , vol.LNCS 1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 14
    • 35048852153 scopus 로고    scopus 로고
    • DPA on n-bit sized boolean and arithmetic operations and its application to IDEA, RC6 and the HMAC-construction
    • M. Joye and J.-J. Quisquater, editors. Springer-Verlag, August
    • K. Lemke, K. Schramm, and C. Paar. DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6 and the HMAC-Construction. In M. Joye and J.-J. Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, volume 3156, pages 205-219. Springer-Verlag, August 2004.
    • (2004) Cryptographic Hardware and Embedded Systems - CHES 2004 , vol.3156 , pp. 205-219
    • Lemke, K.1    Schramm, K.2    Paar, C.3
  • 15
    • 84974679353 scopus 로고    scopus 로고
    • Securing the AES finalists against power analysis attacks
    • B. Schneier, editor. Springer-Verlag
    • T. S. Messerges. Securing the AES Finalists Against Power Analysis Attacks. In B. Schneier, editor, Fast Software Encryption -FSE 2000, volume LNCS 1978, pages 150-164. Springer-Verlag, 2000.
    • (2000) Fast Software Encryption -FSE 2000 , vol.LNCS 1978 , pp. 150-164
    • Messerges, T.S.1
  • 16
    • 68549099555 scopus 로고    scopus 로고
    • Using second-order power analysis to attack DPA resistant software
    • Ç. K. Koç and C. Paar, editors.. Springer-Verlag
    • T. S. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Ç. K. Koç and C. Paar, editors. Cryptographic Hardware and Embedded Systems - CHES 2000, volume LNCS 1965, pages 238 - 251. Springer-Verlag, 2000.
    • (2000) Cryptographic Hardware and Embedded Systems - CHES 2000 , vol.LNCS 1965 , pp. 238-251
    • Messerges, T.S.1
  • 19
    • 47749116367 scopus 로고    scopus 로고
    • AES side channel attack protection using random isomorphisms
    • A. G. Rostovtsev and O.V Shemyakina. AES Side Channel Attack Protection Using Random Isomorphisms, http://eprint.iacr.org/2005/087.pdf, 2005. Cryptology ePrint Archive: Report 2005/087.
    • (2005) Cryptology ePrint Archive: Report , vol.2005 , Issue.87
    • Rostovtsev, A.G.1    Shemyakina, O.V.2
  • 20
    • 35248890508 scopus 로고    scopus 로고
    • Simplified adaptive multiplicative masking for AES
    • B.S. Kaliski, Ç. K. Koç, and C. Paar, editors. Springer-Verlag
    • E. Trichina, D.S. Seta, and L. Germani. Simplified Adaptive Multiplicative Masking for AES. In B.S. Kaliski, Ç. K. Koç, and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, volume 2523, pages 187-197. Springer-Verlag, 2002.
    • (2002) Cryptographic Hardware and Embedded Systems - CHES 2002 , vol.2523 , pp. 187-197
    • Trichina, E.1    Seta, D.S.2    Germani, L.3
  • 21
    • 35048870686 scopus 로고    scopus 로고
    • Towards efficient second-order power analysis
    • M. Joye and J.-J. Quisquater, editors. Springer-Verlag
    • J. Waddle and D. Wagner. Towards Efficient Second-Order Power Analysis. In M. Joye and J.-J. Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, volume 3156, pages 1-15. Springer-Verlag, 2004.
    • (2004) Cryptographic Hardware and Embedded Systems - CHES 2004 , vol.3156 , pp. 1-15
    • Waddle, J.1    Wagner, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.