메뉴 건너뛰기




Volumn 4236 LNCS, Issue , 2006, Pages 159-172

A comparative cost/security analysis of fault attack countermeasures

Author keywords

Attacks and countermeasures in hardware and software

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; ERROR CORRECTION; ERROR DETECTION; FAILURE ANALYSIS; SECURITY OF DATA;

EID: 33845221322     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11889700_15     Document Type: Conference Paper
Times cited : (87)

References (32)
  • 2
    • 84957018842 scopus 로고    scopus 로고
    • Low cost attacks on tamper resistant devices
    • the proceedings of the 5th International Workshop on Security Protocols, Paris, France, April Springer-Verlag
    • R. Anderson, M. Kuhn, Low Cost Attacks on Tamper Resistant Devices, in the proceedings of the 5th International Workshop on Security Protocols, Lecture Notes in Computer Science, vol 1361, pp 125-136, Paris, France, April 1997, Springer-Verlag.
    • (1997) Lecture Notes in Computer Science , vol.1361 , pp. 125-136
    • Anderson, R.1    Kuhn, M.2
  • 5
    • 0037624935 scopus 로고    scopus 로고
    • Error analysis and detection procedures for a hardware implementation of the advanced encryption standard
    • April
    • G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, V. Piuri, Error Analysis And Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard, IEEE Transactions on Computers, vol 52, num 4, pp 492-505, April 2003.
    • (2003) IEEE Transactions on Computers , vol.52 , Issue.4 , pp. 492-505
    • Bertoni, G.1    Breveglieri, L.2    Koren, I.3    Maistri, P.4    Piuri, V.5
  • 6
    • 33845191507 scopus 로고    scopus 로고
    • An efficient hardware-based fault diagnosis scheme for AES: Performance and cost
    • Cannes, France, October
    • G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, An Efficient Hardware-Based Fault Diagnosis Scheme for AES: Performance and Cost, in the proceedings of DFT 2004, 9 pp. Cannes, France, October 2004.
    • (2004) The Proceedings of DFT 2004 , pp. 9
    • Bertoni, G.1    Breveglieri, L.2    Koren, I.3    Maistri, P.4
  • 7
    • 84983134283 scopus 로고    scopus 로고
    • Differential fault analysis on elliptic curve cryptosystems
    • the proceedings of Crypto 2000, Santa Barbara, California, USA, August
    • I. Biehl, B. Meyer, V. Müller, Differential Fault Analysis on Elliptic Curve Cryptosystems, in the proceedings of Crypto 2000, Lecture Notes in Computer Science, vol 1880, pp 131-146, Santa Barbara, California, USA, August 2000.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 131-146
    • Biehl, I.1    Meyer, B.2    Müller, V.3
  • 8
    • 84958641478 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • the proceedings of Crypto 1997, Santa Barbara, CA, USA, August Springer-Verlag
    • E. Biham, A. Shamir, Differential Fault Analysis of Secret Key Cryptosystems, in the proceedings of Crypto 1997, Lecture Notes in Computer Science, vol 1294, pp 513-525, Santa Barbara, CA, USA, August 1997, Springer-Verlag.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 9
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • the proceedings of Eurocrypt 1997, Konstanz, Germany, May Springer-Verlag
    • D. Boneh, R. DeMillo, R. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, in the proceedings of Eurocrypt 1997, Lecture Notes in Computer Science, vol 1233, pp 37-51, Konstanz, Germany, May 1997, Springer-Verlag.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 37-51
    • Boneh, D.1    Demillo, R.2    Lipton, R.3
  • 10
    • 84944904153 scopus 로고    scopus 로고
    • Fast primitives for internal data scrambling in tamper resistant hardware
    • the proceedings of CHES 2001, Paris, France, May
    • E. Brier, H. Handschuh, C. Tymen, Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware, in the proceedings of CHES 2001, Lecture Notes in Computer Science, vol 2162, pp 16-27, Paris, France, May 2001.
    • (2001) Lecture Notes in Computer Science , vol.2162 , pp. 16-27
    • Brier, E.1    Handschuh, H.2    Tymen, C.3
  • 12
    • 35048896529 scopus 로고    scopus 로고
    • Algorithmic tamper-proof security: Theoretical foundations for security against hardware tampering
    • the proceedings of TCC 2004, Cambridge, MA, USA, February Springer-Verlag
    • R. Gennaro, A. Lysyanskaya, T. Malkin, S. Micali, T. Rabin, Algorithmic Tamper-Proof Security: Theoretical Foundations for Security Against Hardware Tampering, in the proceedings of TCC 2004, Lecture Notes in Computer Science, vol 2951, pp 258-277, Cambridge, MA, USA, February 2004, Springer-Verlag.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 258-277
    • Gennaro, R.1    Lysyanskaya, A.2    Malkin, T.3    Micali, S.4    Rabin, T.5
  • 14
    • 21144451450 scopus 로고    scopus 로고
    • DeKaRT: A new paradigm for key-dependent reversible circuits
    • the proceedings of CHES 2003, Cologne, Germany, September
    • J.D. Golic, DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits, in the proceedings of CHES 2003, Lecture Notes in Computer Science, vol 2779, pp 98-112, Cologne, Germany, September 2003.
    • (2003) Lecture Notes in Computer Science , vol.2779 , pp. 98-112
    • Golic, J.D.1
  • 16
    • 35048873283 scopus 로고    scopus 로고
    • Concurrent error detection schemes for involution ciphers
    • the proceedings of CHES 2004, Cambridge, Massachusset, USA, August
    • N. Joshi, K. Wu, R. Karry, Concurrent Error Detection Schemes for Involution Ciphers, in the proceedings of CHES 2004, Lecture Notes in Computer Science, vol 3156, pp 400-412, Cambridge, Massachusset, USA, August 2004.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 400-412
    • Joshi, N.1    Wu, K.2    Karry, R.3
  • 17
    • 0004794569 scopus 로고    scopus 로고
    • Chinese remaindering based cryptosystems in the presence of faults
    • Springer-Verlag
    • M. Joye, A.K. Lenstra, J.-J. Quisquater, Chinese Remaindering Based Cryptosystems in the Presence of Faults, Journal of Cryptology, vol 12, num 4, pp 241-246, 1999, Springer-Verlag.
    • (1999) Journal of Cryptology , vol.12 , Issue.4 , pp. 241-246
    • Joye, M.1    Lenstra, A.K.2    Quisquater, J.-J.3
  • 19
    • 33845223243 scopus 로고    scopus 로고
    • Differential fault analysis attack resistant architectures for the advanced encryption standard
    • Toulouse, Prance, August
    • M. Karpovsky, K.J. Kulikowski, A. Taubin, Differential Fault Analysis Attack Resistant Architectures For The Advanced Encryption Standard, in the proceedings of CARDIS 2004, Toulouse, Prance, August 2004.
    • (2004) The Proceedings of CARDIS 2004
    • Karpovsky, M.1    Kulikowski, K.J.2    Taubin, A.3
  • 20
    • 4544294542 scopus 로고    scopus 로고
    • Robust protection against fault injection attacks on smart cards implementing the advanced encryption standard
    • Florence, Italy, June
    • M. Karpovsky, K.J. Kulikowski, A. Taubin, Robust Protection against Fault Injection Attacks on Smart Cards Implementing the Advanced Encryption Standard, in the proceedings of DSN 2004, 9pp, Florence, Italy, June: 2004.
    • (2004) The Proceedings of DSN 2004 , pp. 9
    • Karpovsky, M.1    Kulikowski, K.J.2    Taubin, A.3
  • 21
    • 0036913523 scopus 로고    scopus 로고
    • Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers
    • December
    • R. Karri, K. Wu, P. Mishra, Y. Kim, Concurrent Error Detection Schemes for Fault-Based Side-Channel Cryptanalysis of Symmetric Block Ciphers, in IEEE Transactions on Computer-Aided Design, vol 21, num 12, pp 1509-1517, December 2002.
    • (2002) IEEE Transactions on Computer-aided Design , vol.21 , Issue.12 , pp. 1509-1517
    • Karri, R.1    Wu, K.2    Mishra, P.3    Kim, Y.4
  • 22
    • 0142184761 scopus 로고    scopus 로고
    • Parity-based concurrent error detection in symmetric block ciphers
    • Charlotte, USA, September
    • R. Karri, M. Gössel, Parity-Based Concurrent Error Detection in Symmetric Block Ciphers, in the proceedings of ITC 2003, pp 919-926, Charlotte, USA, September 2003/
    • (2003) The Proceedings of ITC 2003 , pp. 919-926
    • Karri, R.1    Gössel, M.2
  • 23
    • 35248863449 scopus 로고    scopus 로고
    • Parity-based concurrent error detection of substitution-permutation network block ciphers
    • the proceedings of CHES 2003, Cologne, Germany, September
    • R. Karri, G. Kuznetsov, M. Gössel, Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers, in the proceedings of CHES 2003, Lecture Notes in Computer Science, vol 2779, pp 113-124, Cologne, Germany, September 2003.
    • (2003) Lecture Notes in Computer Science , vol.2779 , pp. 113-124
    • Karri, R.1    Kuznetsov, G.2    Gössel, M.3
  • 24
    • 33750738951 scopus 로고    scopus 로고
    • Robust codes for fault attack resistant cryptographic hardware
    • Edinburgh, Scotland, September
    • K.J. Kulikowski, M.Karpovsky, A. Taubin, Robust Codes for Fault Attack Resistant Cryptographic Hardware, in the proceedings of FDTC 2005, pp 2-12, Edinburgh, Scotland, September 2005.
    • (2005) The Proceedings of FDTC 2005 , pp. 2-12
    • Kulikowski, K.J.1    Karpovsky, M.2    Taubin, A.3
  • 27
    • 35248837397 scopus 로고    scopus 로고
    • A differential fault attack technique against SPN structures, with Applications to the AES and Khazad
    • the proceedings of CHES 2003, Cologn, Germany, September
    • G. Piret, J.-J. Quisquater, A Differential Fault Attack Technique Against SPN Structures, With Applications to the AES and Khazad, in the proceedings of CHES 2003, Lecture Notes in Computer Science, vol 2779, pp 77-88, Cologn, Germany, September 2003.
    • (2003) Lecture Notes in Computer Science , vol.2779 , pp. 77-88
    • Piret, G.1    Quisquater, J.-J.2
  • 31
    • 35248813476 scopus 로고    scopus 로고
    • Optical fault induction attacks
    • the proceedings of CHES 2002, Redwood City, CA, USA, August Springer-Verlag
    • S. Skorobogatov, R. Anderson, Optical Fault Induction Attacks, in the proceedings of CHES 2002, Lecture Notes in Computer Science, vdl 2523, pp 2-12, Redwood City, CA, USA, August 2002, Springer-Verlag.
    • (2002) Lecture Notes in Computer Science , vol.2523 , pp. 2-12
    • Skorobogatov, S.1    Anderson, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.