메뉴 건너뛰기




Volumn 3254, Issue , 2004, Pages 481-490

A Power Consumption Randomization Countermeasure for DPA-Resistant Cryptographic Processors

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; ELECTRIC POWER UTILIZATION; HARDWARE SECURITY; INTEGRATED CIRCUIT DESIGN; RADAR COUNTERMEASURES;

EID: 33846588491     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30205-6_50     Document Type: Article
Times cited : (47)

References (13)
  • 1
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis, Proc. Advances in Cryptology (CRYPTO '99)
    • Springer-Verlag
    • P. Kocher, J. Jaffe and B. Jun, Differential power analysis, Proc. Advances in Cryptology (CRYPTO '99), Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, pp. 388-397, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 2
    • 0036566408 scopus 로고    scopus 로고
    • Examining Smart-Card Security under the Threat of Power Analysis Attacks
    • May
    • T. S. Messerges, E. A. Dabbish and R. H. Sloan, Examining Smart-Card Security under the Threat of Power Analysis Attacks, IEEE Trans. Computers, vol. 51, no. 5, pp. 541-552, May 2002.
    • (2002) IEEE Trans. Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 5
    • 0004777155 scopus 로고    scopus 로고
    • Resistance Against Implementation Attacks: A Comparative Study of the AES Proposals
    • http://csrc.nist.gov/encryption/aes/roundl/conf2/aes2conf.htm
    • J. Daemen and V. Rijmen, Resistance Against Implementation Attacks: A Comparative Study of the AES Proposals, Proc. Second Advanced Encryption Standard Candidate Conf., available at http://csrc.nist.gov/encryption/aes/ roundl/conf2/aes2conf.htm, 1999.
    • (1999) Proc. Second Advanced Encryption Standard Candidate Conf.
    • Daemen, J.1    Rijmen, V.2
  • 6
    • 0035481641 scopus 로고    scopus 로고
    • Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for Koblitz Curve Cryptosystems
    • Oct.
    • M. A. Kasan, Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for Koblitz Curve Cryptosystems, IEEE Trans. Computers, vol. 50, no. 10, pp. 1071-1083, Oct. 2001.
    • (2001) IEEE Trans. Computers , vol.50 , Issue.10 , pp. 1071-1083
    • Kasan, M.A.1
  • 9
    • 68549107606 scopus 로고    scopus 로고
    • Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
    • Lecture Notes in Computer Science, Springer-Verlag
    • A. Shamir, Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies, Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES '00), Lecture Notes in Computer Science, vol. 1965, Springer-Verlag, pp. 71-77, 2000.
    • (2000) Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES '00) , vol.1965 , pp. 71-77
    • Shamir, A.1
  • 11
    • 84893732023 scopus 로고    scopus 로고
    • A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards
    • K. Tiri, M. Akmal and I. Verbauwhede, A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards, Proc. IEEE 28th European Solid-State Circuit Conf. (ESSCIRC '02), 2002.
    • (2002) Proc. IEEE 28th European Solid-State Circuit Conf. (ESSCIRC '02)
    • Tiri, K.1    Akmal, M.2    Verbauwhede, I.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.