메뉴 건너뛰기




Volumn 3960 LNCS, Issue , 2006, Pages 192-207

Practical second-order DPA attacks for masked smart card implementations of block ciphers

Author keywords

[No Author keywords available]

Indexed keywords

BLOCK CODES; CRYPTOGRAPHY; DATA PROCESSING; SMART CARDS; LYAPUNOV METHODS; SECURITY OF DATA; SIDE CHANNEL ATTACK; TRANSPORTATION;

EID: 33745679179     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11605805_13     Document Type: Conference Paper
Times cited : (143)

References (10)
  • 1
    • 35048848006 scopus 로고    scopus 로고
    • Two power analysis attacks against one-mask methods
    • [ABG04]. Bimal K. Roy and Willi Meier, editors, Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers. Springer
    • [ABG04] Mehdi-Laurent Akkar, Régis Bevan, and Louis Goubin. Two Power Analysis Attacks against One-Mask Methods. In Bimal K. Roy and Willi Meier, editors, Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, volume 3017 of Lecture Notes in Computer Science, pages 332-347. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3017 , pp. 332-347
    • Akkar, M.-L.1    Bevan, R.2    Goubin, L.3
  • 2
    • 68549099548 scopus 로고    scopus 로고
    • Differential power analysis in the presence of hardware countermeasures
    • [CCD00]. Çetin Kaya Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings. Springer
    • [CCD00] Christophe Clavier, Jean-Sébastien Coron, and Nora Dabbous. Differential Power Analysis in the Presence of Hardware Countermeasures. In Çetin Kaya Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, volume 1965 of Lecture Notes in Computer Science, pages 252-263. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1965 , pp. 252-263
    • Clavier, C.1    Coron, J.-S.2    Dabbous, N.3
  • 3
    • 84957079591 scopus 로고    scopus 로고
    • Towards sound approaches to counteract power-analysis attacks
    • [CJRR99]. Michael J. Wiener, editor, Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings. Springer
    • [CJRR99] Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, and Pankaj Rohatgi. Towards Sound Approaches to Counteract Power-Analysis Attacks. In Michael J. Wiener, editor, Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, volume 1666 of Lecture Notes in Computer Science, pages 398-412. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 398-412
    • Chari, S.1    Jutla, C.S.2    Rao, J.R.3    Rohatgi, P.4
  • 5
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • [KJJ99]. Michael Wiener, editor, Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings. Springer
    • [KJJ99] Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power Analysis. In Michael Wiener, editor, Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 6
    • 35048819488 scopus 로고    scopus 로고
    • Hardware countermeasures against DPA - A statistical analysis of their effectiveness
    • [Man04]. Tatsuaki Okamoto, editor, Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings. Springer
    • [Man04] Stefan Mangard. Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness. In Tatsuaki Okamoto, editor, Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, volume 2964 of Lecture Notes in Computer Science, pages 222-235. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2964 , pp. 222-235
    • Mangard, S.1
  • 7
    • 68549099555 scopus 로고    scopus 로고
    • Using second-order power analysis to attack DPA resistant software
    • [Mes00]. Çetin Kaya Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings. Springer
    • [Mes00] Thomas S. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Çetin Kaya Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, volume 1965 of Lecture Notes in Computer Science, pages 238-251. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1965 , pp. 238-251
    • Messerges, T.S.1
  • 9
    • 24744434942 scopus 로고    scopus 로고
    • On the masking countermeasure and higher-order power analysis attacks
    • [SPQ05]
    • [SPQ05] Francois-Xavier Standaert, Eric Peeters, and Jean-Jacques Quisquater. On the Masking Countermeasure and Higher-Order Power Analysis Attacks. In ITCC 2005, 2005.
    • (2005) ITCC 2005
    • Standaert, F.-X.1    Peeters, E.2    Quisquater, J.-J.3
  • 10
    • 35048870686 scopus 로고    scopus 로고
    • Towards efficient second-order power analysis
    • [WW04]. Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 11-13, 2004, Proceedings. Springer
    • [WW04] Jason Waddle and David Wagner. Towards Efficient Second-Order Power Analysis. In Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 11-13, 2004, Proceedings, volume 3156 of Lecture Notes in Computer Science, pages 1-15. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 1-15
    • Waddle, J.1    Wagner, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.