메뉴 건너뛰기




Volumn 4249 LNCS, Issue , 2006, Pages 1-14

Template attacks in principal subspaces

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; FIELD PROGRAMMABLE GATE ARRAYS; HEURISTIC METHODS; INFORMATION RETRIEVAL; MAXIMUM LIKELIHOOD ESTIMATION;

EID: 33750722766     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11894063_1     Document Type: Conference Paper
Times cited : (227)

References (12)
  • 1
    • 35048818034 scopus 로고    scopus 로고
    • Correlation power analysis with a leakage model
    • Marc Joye and Jean-Jacques Quisquater, editors, CHES. Springer
    • Eric Brier, Christophe Clavier, and Francis Olivier. Correlation power analysis with a leakage model. In Marc Joye and Jean-Jacques Quisquater, editors, CHES, volume 3156 of Lecture Notes in Computer Science, pages 16-29. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 16-29
    • Brier, E.1    Clavier, C.2    Olivier, F.3
  • 2
    • 35248899532 scopus 로고    scopus 로고
    • Template attacks
    • Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES). Springer
    • Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi. Template attacks. In Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), volume 2523 of Lecture Notes in Computer Science, 13-28. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2523 , pp. 13-28
    • Chari, S.1    Rao, J.R.2    Rohatgi, P.3
  • 6
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Neal Koblitz, editor, 16th Annual International Cryptology Conference (CRYPTO). Springer
    • Paul C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Neal Koblitz, editor, 16th Annual International Cryptology Conference (CRYPTO), volume 1109 of Lecture Notes in Computer Science, 104-113. Springer, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 7
    • 84941162644 scopus 로고    scopus 로고
    • Microship. PIC16F877 datasheet, url: wwl.microchip.com/downloads/en/ Device-Doc/30292c.pdf, 2001.
    • (2001) PIC16F877 Datasheet
  • 8
    • 23944455328 scopus 로고    scopus 로고
    • Practical template attacks
    • Chae Hoon Lim and Moti Yung, editors, 5th International Workshop on Information Security Applications (WISA). Springer
    • Christian Rechberger and Elisabeth Oswald. Practical template attacks. In Chae Hoon Lim and Moti Yung, editors, 5th International Workshop on Information Security Applications (WISA), volume 3325 of Lecture Notes in Computer Science, 440-456. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3325 , pp. 440-456
    • Rechberger, C.1    Oswald, E.2
  • 9
    • 24744465637 scopus 로고    scopus 로고
    • Power analysis of an FPGA implementation of Rijndael: Is pipelining a DPA countermeasure?
    • Marc Joye and Jean-Jacques Quisquater, editors, 6th International Workshop Cryptographic Hardware and Embedded Systems (CHES). Springer
    • F.-X. Standaert, S.B. Ors, and B. Preneel. Power analysis of an FPGA implementation of Rijndael: Is pipelining a DPA countermeasure? In Marc Joye and Jean-Jacques Quisquater, editors, 6th International Workshop Cryptographic Hardware and Embedded Systems (CHES), volume 3156 of Lecture Notes in Computer Science, 30-44. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 30-44
    • Standaert, F.-X.1    Ors, S.B.2    Preneel, B.3
  • 11
    • 35248847435 scopus 로고    scopus 로고
    • Efficient implementation of Rijndael encryption in reconfigurable hardware: Improvements and design tradeoffs
    • Colin D. Walter, Çetin Kaya Koç, and Christof Paar, editors, 5th International Workshop Cryptographic Hardware and Embedded Systems (CHES). Springer
    • F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, and J.-D. Legat. Efficient implementation of Rijndael encryption in reconfigurable hardware: Improvements and design tradeoffs. In Colin D. Walter, Çetin Kaya Koç, and Christof Paar, editors, 5th International Workshop Cryptographic Hardware and Embedded Systems (CHES), volume 2779 of Lecture Notes in Computer Science, 334-350. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2779 , pp. 334-350
    • Standaert, F.-X.1    Rouvroy, G.2    Quisquater, J.-J.3    Legat, J.-D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.