메뉴 건너뛰기




Volumn 2, Issue , 2006, Pages

Satisfiability-based framework for enabling side-channel attacks on cryptographic software

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; BOOLEAN ALGEBRA; COMPUTER CRIME; CRYPTOGRAPHY; INFORMATION THEORY; PROBLEM SOLVING; SECURITY OF DATA;

EID: 34047141132     PISSN: 15301591     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/date.2006.244158     Document Type: Conference Paper
Times cited : (5)

References (30)
  • 3
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Aug
    • P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," in Proc. Advances in Cryptology (CRYPTO '96), pp. 104-113, Aug. 1996.
    • (1996) Proc. Advances in Cryptology (CRYPTO '96) , pp. 104-113
    • Kocher, P.1
  • 5
    • 0036566408 scopus 로고    scopus 로고
    • Examining smartcard security under the threat of power analysis attacks
    • May
    • T. Messerges, E. A. Dabbish, and R. H. Sloan, "Examining smartcard security under the threat of power analysis attacks," IEEE Trans. Computers, vol. 51, pp. 541-552, May 2002.
    • (2002) IEEE Trans. Computers , vol.51 , pp. 541-552
    • Messerges, T.1    Dabbish, E.A.2    Sloan, R.H.3
  • 6
    • 0022218742 scopus 로고
    • Electromagnetic radiation from video display units: An eavesdropping risk
    • W. van Eck, "Electromagnetic radiation from video display units: An eavesdropping risk," Computers and Security, vol. 4, pp. 269-288, 1985.
    • (1985) Computers and Security , vol.4 , pp. 269-288
    • van Eck, W.1
  • 8
    • 0033705991 scopus 로고    scopus 로고
    • Side channel cryptanalysis of product ciphers
    • J. Kelsey, B. Schneier, D. Wagner, and C. Hall, "Side channel cryptanalysis of product ciphers," J. Computer Security, vol. 8, no. 2, pp. 141-158, 2000.
    • (2000) J. Computer Security , vol.8 , Issue.2 , pp. 141-158
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3    Hall, C.4
  • 11
    • 35248825993 scopus 로고    scopus 로고
    • Securing encryption algorithms against DPA at the logic level: Next generation smart card technology
    • K. Tiri and I. Verbauwhede, "Securing encryption algorithms against DPA at the logic level: Next generation smart card technology," in Proc. Cryptographic Hardware and Embedded Systems, pp. 125-136, 2003.
    • (2003) Proc. Cryptographic Hardware and Embedded Systems , pp. 125-136
    • Tiri, K.1    Verbauwhede, I.2
  • 14
    • 34047158316 scopus 로고    scopus 로고
    • Security bugs exposed: A system-atic approach to uncovering software vulnerabilities
    • Mar
    • J. Whittaker and H. H. Thompson, "Security bugs exposed: A system-atic approach to uncovering software vulnerabilities," Software Testing and Quality Engineering, pp. 28-32, Mar. 2003.
    • (2003) Software Testing and Quality Engineering , pp. 28-32
    • Whittaker, J.1    Thompson, H.H.2
  • 17
    • 84937545785 scopus 로고    scopus 로고
    • The quest for efficient Boolean satisfiability solvers
    • July
    • L. Zhang and S. Malik, "The quest for efficient Boolean satisfiability solvers," in Proc. Int. Conf. Computer-Aided Verif., pp. 17-36, July 2002.
    • (2002) Proc. Int. Conf. Computer-Aided Verif , pp. 17-36
    • Zhang, L.1    Malik, S.2
  • 19
    • 26144437464 scopus 로고
    • Cryptanalysis of the data encryption standard by the method of formal coding
    • May
    • I. Schaumuller-Bichl, "Cryptanalysis of the data encryption standard by the method of formal coding," in Proc. Advances in Cryptology (Eurocrypt '82), pp. 235-255, May 1982.
    • (1982) Proc. Advances in Cryptology (Eurocrypt '82) , pp. 235-255
    • Schaumuller-Bichl, I.1
  • 20
    • 0034140491 scopus 로고    scopus 로고
    • Logical cryptanalysis as a SAT problem
    • Feb
    • F. Massacci and L. Marraro, "Logical cryptanalysis as a SAT problem," J. Automated Reasoning, vol. 24, pp. 165-203, Feb. 2000.
    • (2000) J. Automated Reasoning , vol.24 , pp. 165-203
    • Massacci, F.1    Marraro, L.2
  • 27
    • 3042738504 scopus 로고    scopus 로고
    • Why secure applications are difficult to write
    • Mar
    • J. Whittaker, "Why secure applications are difficult to write," IEEE Security and Privacy, vol. 1, pp. 81-83, Mar. 2003.
    • (2003) IEEE Security and Privacy , vol.1 , pp. 81-83
    • Whittaker, J.1
  • 28
    • 33645492588 scopus 로고    scopus 로고
    • National Institute of Standards and Technology
    • National Institute of Standards and Technology, Federal Information Processing Standard 46-3. http://csrc.nist.gov/publications/fips/fips46-3/ fips46-3.pdf, 1999.
    • (1999) Federal Information Processing Standard 46-3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.