메뉴 건너뛰기




Volumn 4058 LNCS, Issue , 2006, Pages 17-28

Cache based power analysis attacks on AES

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; BOOLEAN ALGEBRA; COMPUTER SOFTWARE; INFORMATION ANALYSIS; PROGRAM PROCESSORS; SMART CARDS;

EID: 33746329953     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11780656_2     Document Type: Conference Paper
Times cited : (15)

References (16)
  • 1
    • 84943615552 scopus 로고    scopus 로고
    • An implementation of des and AES secure against some attacks
    • Ç. K. Koç, D. Naccache, and C. Paar, editors, Cryptogaphic Hardware and Embedded Systems - CHES 2001, Springer-Verlag
    • M.-L. Akkar and C. Giraud. An implementation of DES and AES secure against some attacks. In Ç. K. Koç, D. Naccache, and C. Paar, editors, Cryptogaphic Hardware and Embedded Systems - CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 309-318. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2162 , pp. 309-318
    • Akkar, M.-L.1    Giraud, C.2
  • 4
    • 68549099548 scopus 로고    scopus 로고
    • Differential power analysis in the presence of hardware countermeasures
    • Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, Springer-Verlag
    • C. Clavier, J.-S. Coron, and N. Dabbous. Differential power analysis in the presence of hardware countermeasures. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, volume 1965 of Lecture Notes in Computer Science, pages 252-263. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1965 , pp. 252-263
    • Clavier, C.1    Coron, J.-S.2    Dabbous, N.3
  • 6
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • M. J. Wiener, editor, Advances in Cryptology - CRYPTO '99, Springer-Verlag
    • P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In M. J. Wiener, editor, Advances in Cryptology - CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 8
    • 84941154719 scopus 로고    scopus 로고
    • MIPS-Technologies. SmartMIPS ASE. http://www.mips.com/content/Products/.
    • SmartMIPS ASE
  • 9
    • 0042357566 scopus 로고    scopus 로고
    • MIPS™architecture for programmers volume I: Introduction to the MIPS32™architecture. Revision 0.95, March
    • MIPS-Technologies. MIPS™architecture for programmers volume I: Introduction to the MIPS32™architecture. Technical Report MD00082, Revision 0.95, March 2001.
    • (2001) Technical Report , vol.MD00082
  • 11
    • 33745640963 scopus 로고    scopus 로고
    • Cache attacks and countermeasures: The case of AES
    • D. Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, Springer-Verlag
    • D. A. Osvik, A. Shamir, and E. Tromer. Cache attacks and countermeasures: the case of AES. In D. Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, volume 3860 of Lecture Notes in Computer Science, pages 1-20. Springer-Verlag, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3860 , pp. 1-20
    • Osvik, D.A.1    Shamir, A.2    Tromer, E.3
  • 12
    • 1942457187 scopus 로고    scopus 로고
    • Theoretical use of cache memory as a cryptanalytic side-channel
    • D. Page. Theoretical use of cache memory as a cryptanalytic side-channel. Cryptology ePrint Archive, Report 2002/169, 2002. http://eprint.iacr.org/.
    • (2002) Cryptology EPrint Archive, Report , vol.2002 , Issue.169
    • Page, D.1
  • 13
    • 1942441379 scopus 로고    scopus 로고
    • Defending against cache based side-channel attacks
    • April
    • D. Page. Defending against cache based side-channel attacks. Information Security Technical Report, 8(1):30-44, April 2003.
    • (2003) Information Security Technical Report , vol.8 , Issue.1 , pp. 30-44
    • Page, D.1
  • 15
    • 33746372361 scopus 로고    scopus 로고
    • preliminary short product information 04.03
    • Infineon Technologies AG Secure and Mobile Solutions Security Group. Security & chip cards ICs SLE88Cx4000P, preliminary short product information 04.03, 2003.
    • (2003) Security & Chip Cards ICs SLE88Cx4000P
  • 16
    • 35248855964 scopus 로고    scopus 로고
    • Cryptanalysis of des implemented on computers with cache
    • C. D. Walter, Ç. K. Koç, and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag
    • Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, and H. Miyauchi. Cryptanalysis of DES implemented on computers with cache. In C. D. Walter, Ç. K. Koç, and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2003, volume 2779 of Lecture Notes in Computer Science, pages 62-76. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2779 , pp. 62-76
    • Tsunoo, Y.1    Saito, T.2    Suzaki, T.3    Shigeri, M.4    Miyauchi, H.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.