메뉴 건너뛰기




Volumn 3989 LNCS, Issue , 2006, Pages 253-267

Physical security bounds against tampering

Author keywords

Adversarial Model; Error Detection; Fault Analysis; Fault Detection; Fault Prevention; Implementation Attack; Physical Security; Tamper Proof Hardware

Indexed keywords

COMPUTATION THEORY; CRYPTOGRAPHY; ERROR DETECTION; MATHEMATICAL MODELS;

EID: 33746611886     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11767480_17     Document Type: Conference Paper
Times cited : (1)

References (27)
  • 6
    • 26444596644 scopus 로고    scopus 로고
    • Impossible fault analysis of RC4 arid differential fault analysis of RC4
    • Henri Gilbert and Helena Handschuh, editors, Fast Software Encryption: 12th International Workshop, Springer
    • Eli Biham, Louis Granboulan, and Phong Q. Nguyen, Impossible Fault Analysis of RC4 arid Differential Fault Analysis of RC4. In Henri Gilbert and Helena Handschuh, editors, Fast Software Encryption: 12th International Workshop, volume 3557 of Lecture Notes in Computer Science, pages 359-367. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3557 , pp. 359-367
    • Biham, E.1    Granboulan, L.2    Nguyen, P.Q.3
  • 8
    • 84958641478 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • Burton S. Kaliski Jr., editor, CRYPTO, Springer
    • Eli Biham and Adi Shamir. Differential fault analysis of secret key cryptosystems. In Burton S. Kaliski Jr., editor, CRYPTO, volume 1294 of Lecture Notes in Computer Science, pages 513-525. Springer, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 9
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults (Extended Abstract)
    • Walter Fumy, editor, Advances in Cryptology - EUROCRYPT '97, Springer
    • Dan Boneh, Richard A. DeMillo, and Richard J. Lipton. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). In Walter Fumy, editor, Advances in Cryptology - EUROCRYPT '97, volume 1233 of Lecture Notes in Computer Science, pages 37-51. Springer, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 37-51
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 11
    • 35048896529 scopus 로고    scopus 로고
    • Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
    • Moni Naor, editor, Theory of Cryptography, Springer
    • Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, and Tal Rabin. Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. In Moni Naor, editor, Theory of Cryptography, volume 2951 of Lecture Notes in Computer Science, pages 258-277. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 258-277
    • Gennaro, R.1    Lysyanskaya, A.2    Malkin, T.3    Micali, S.4    Rabin, T.5
  • 13
    • 35048850492 scopus 로고    scopus 로고
    • Fault analysis of stream ciphers
    • Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, Springer
    • Jonathan J. Hoch and Adi Shamir. Fault analysis of stream ciphers. In Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, volume 3156 of Lecture Notes in Computer Science, pages 240-253. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 240-253
    • Hoch, J.J.1    Shamir, A.2
  • 14
    • 33746583305 scopus 로고    scopus 로고
    • Burton S. Kaliski Jr., Cetin Kaya Koç, and Christof Paar, editors. Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, Springer
    • Burton S. Kaliski Jr., Cetin Kaya Koç, and Christof Paar, editors. Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, volume 2523 of Lecture Notes in Computer Science. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2523
  • 17
    • 33746591860 scopus 로고    scopus 로고
    • An adversarial model for fault analysis against low-cost cryptographic devices
    • Kerstin Lemke and Christof Paar. An Adversarial Model for Fault Analysis against Low-Cost Cryptographic Devices. In Workshop on Fault Detection and Tolerance in Cryptography, pages 82-94, 2005.
    • (2005) Workshop on Fault Detection and Tolerance in Cryptography , pp. 82-94
    • Lemke, K.1    Paar, C.2
  • 21
    • 84859826346 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST). Physical Reference Data, available at http://physics.nist.gov/PhysRefData/contents.html.
    • Physical Reference Data
  • 23
    • 33845228721 scopus 로고    scopus 로고
    • Eddy current for magnetic analysis with active sensor
    • David Samyde and Jean-Jacques Quisquater. Eddy Current for Magnetic Analysis with Active Sensor. In Proceedings of ESmart 2002, pages 185-194, 2002.
    • (2002) Proceedings of ESmart 2002 , pp. 185-194
    • Samyde, D.1    Quisquater, J.-J.2
  • 25
    • 27244445173 scopus 로고    scopus 로고
    • Semi-invasive attacks - A new approach to hardware security analysis
    • Sergei S. Skorobogatov, Semi-invasive attacks - A new approach to hardware security analysis, available at http://www.cl.cam.ac.uk/techreports/ucam-cl-tr-630.pdf. Technical report, 2005.
    • (2005) Technical Report
    • Skorobogatov, S.S.1
  • 27
    • 33746628668 scopus 로고    scopus 로고
    • Colin D. Walter, Çetin Kaya Koç, and Christof Paar, editors. Cryptographic Hardware and Embedded Systems - CUES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings, Springer
    • Colin D. Walter, Çetin Kaya Koç, and Christof Paar, editors. Cryptographic Hardware and Embedded Systems - CUES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings, volume 2779 of Lecture Notes in Computer Science. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2779


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.