메뉴 건너뛰기




Volumn , Issue , 2007, Pages 15-20

Side-channel attack pitfalls

Author keywords

Differential power analysis; Encryption; Security IC; Side channel attack

Indexed keywords

ALGORITHMS; COMPUTATIONAL COMPLEXITY; COMPUTER CRIME; COMPUTER HARDWARE; COMPUTER SOFTWARE; ELECTRIC POWER UTILIZATION; INTEGRATED CIRCUITS;

EID: 34547251027     PISSN: 0738100X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DAC.2007.375044     Document Type: Conference Paper
Times cited : (51)

References (40)
  • 2
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, Other Systems
    • P. Kocher "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, Other Systems" CRYPTO, pp. 104-113, 1996.
    • (1996) CRYPTO , pp. 104-113
    • Kocher, P.1
  • 3
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • P. Kocher, J. Jaffe, B. Jun "Differential Power Analysis" CRYPTO, pp. 388-397, 1999.
    • (1999) CRYPTO , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 4
    • 35248815162 scopus 로고    scopus 로고
    • Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor
    • C. H. Gebotys, R. J. Gebotys "Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor" CHES, pp. 114-128, 2002.
    • (2002) CHES , pp. 114-128
    • Gebotys, C.H.1    Gebotys, R.J.2
  • 6
    • 3042545023 scopus 로고    scopus 로고
    • S. B. Ors, F. Gurkaynak, E. Oswald, B. Preneel Power-Analysis Attack on an ASIC AES implementation ITCC, 2004.
    • S. B. Ors, F. Gurkaynak, E. Oswald, B. Preneel "Power-Analysis Attack on an ASIC AES implementation" ITCC, 2004.
  • 7
    • 35248855964 scopus 로고    scopus 로고
    • Cryptanalysis of DES Implemented on Computers with Cache
    • Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, H. Miyauchi "Cryptanalysis of DES Implemented on Computers with Cache" CHES, pp. 62-76, 2003.
    • (2003) CHES , pp. 62-76
    • Tsunoo, Y.1    Saito, T.2    Suzaki, T.3    Shigeri, M.4    Miyauchi, H.5
  • 9
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic Analysis: Concrete Results
    • K. Gandolfi, C. Mourtel, F. Olivier "Electromagnetic Analysis: Concrete Results" CHES, pp. 251-261, 2001.
    • (2001) CHES , pp. 251-261
    • Gandolfi, K.1    Mourtel, C.2    Olivier, F.3
  • 13
    • 34047117968 scopus 로고    scopus 로고
    • Cache missing for fun, profit
    • 〈online〈
    • C. Percival "Cache missing for fun, profit" BSDCan, http://www.daemonology.net/papers/htt.pdf 〈online〈, 2005.
    • (2005) BSDCan
    • Percival, C.1
  • 18
    • 34547322041 scopus 로고    scopus 로고
    • E. Brickell, G. Graunke, M. Neve, J.-P. Seifert Software mitigations to hedge AES against cache-based software side channel vulnerabilities IACR ePrint, rep. 2006/052, 2006.
    • E. Brickell, G. Graunke, M. Neve, J.-P. Seifert "Software mitigations to hedge AES against cache-based software side channel vulnerabilities" IACR ePrint, rep. 2006/052, 2006.
  • 19
    • 34547246932 scopus 로고    scopus 로고
    • OpenSSL Project, 〈online〉
    • OpenSSL Project, http://www.openssl.org/ 〈online〉.
  • 20
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against Differential Power Analysis for Elliptic Curve Crypto systems
    • J.-S. Coron "Resistance against Differential Power Analysis for Elliptic Curve Crypto systems" CHES, pp. 292-302, 1999.
    • (1999) CHES , pp. 292-302
    • Coron, J.-S.1
  • 21
    • 33645692468 scopus 로고    scopus 로고
    • AES-Based Cryptographic, Biometrie Security Coprocessor IC in 0.18-μm CMOS Resistant to Side-Channel Power Analysis Attacks
    • K. Tiri, D. Hwang, A. Hodjat, B.-C. Lai, S. Yang, P. Schaumont, I. Verbauwhede "AES-Based Cryptographic, Biometrie Security Coprocessor IC in 0.18-μm CMOS Resistant to Side-Channel Power Analysis Attacks" VLSI SYMPOSIUM, pp. 216-219, 2005.
    • (2005) VLSI SYMPOSIUM , pp. 216-219
    • Tiri, K.1    Hwang, D.2    Hodjat, A.3    Lai, B.-C.4    Yang, S.5    Schaumont, P.6    Verbauwhede, I.7
  • 22
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • T. Messerges, E. Dabbish, R. Sloan "Examining smart-card security under the threat of power analysis attacks" IEEE TC, Vol. 51, Issue: 5, pp. 541-552, 2002.
    • (2002) IEEE TC , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.1    Dabbish, E.2    Sloan, R.3
  • 23
    • 68549099548 scopus 로고    scopus 로고
    • Differential Power Analysis in the Presence of Hardware Countermeasures
    • C. Clavier, J. Coron, N. Dabbous "Differential Power Analysis in the Presence of Hardware Countermeasures" CHES, pp. 252-263, 2000.
    • (2000) CHES , pp. 252-263
    • Clavier, C.1    Coron, J.2    Dabbous, N.3
  • 24
    • 68549107606 scopus 로고    scopus 로고
    • Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
    • A. Shamir "Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies" CHES, pp. 71-77, 2000.
    • (2000) CHES , pp. 71-77
    • Shamir, A.1
  • 26
    • 27244431906 scopus 로고    scopus 로고
    • Random Switching Logic: A Countermeasure against DPA based on Transition Probability
    • D. Suzuki, M. Saeki, T. Ichikawa "Random Switching Logic: A Countermeasure against DPA based on Transition Probability," IACR ePrint, rep. 2004/346, 2004.
    • (2004) IACR ePrint, rep , pp. 2004-2346
    • Suzuki, D.1    Saeki, M.2    Ichikawa, T.3
  • 27
    • 27244451515 scopus 로고    scopus 로고
    • Masked Dual-Rail Pre-charge Logic: DPA Resistance without the Routing Constraints
    • T. Popp, S. Mangard "Masked Dual-Rail Pre-charge Logic: DPA Resistance without the Routing Constraints," CHES, pp. 172-186, 2005.
    • (2005) CHES , pp. 172-186
    • Popp, T.1    Mangard, S.2
  • 28
    • 84893732023 scopus 로고    scopus 로고
    • A Dynamic, Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards
    • K. Tiri, M. Akmal, I. Verbauwhede "A Dynamic, Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards" ESSCIRC, pp. 403-406, 2002.
    • (2002) ESSCIRC , pp. 403-406
    • Tiri, K.1    Akmal, M.2    Verbauwhede, I.3
  • 29
    • 0041325255 scopus 로고    scopus 로고
    • S. Moore, R. Anderson, R. Mullins, G. Taylor Balanced selfchecking asynchronous logic for smart card applications, J. Microprocess. Microsyst., 27.9, pp. 421-430, 2003.
    • S. Moore, R. Anderson, R. Mullins, G. Taylor "Balanced selfchecking asynchronous logic for smart card applications," J. Microprocess. Microsyst., vol. 27.9, pp. 421-430, 2003.
  • 30
    • 33744734677 scopus 로고    scopus 로고
    • K. Tiri, I. Verbauwhede A digital design flow for secure integrated circuits IEEE TCAD, 25.7, pp. 1197-1208, 2006.
    • K. Tiri, I. Verbauwhede "A digital design flow for secure integrated circuits" IEEE TCAD, vol. 25.7, pp. 1197-1208, 2006.
  • 33
    • 33750723763 scopus 로고    scopus 로고
    • Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks
    • K. Kulikowski, A. Smirnov, A. Taubin "Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks" CHES, pp. 399-413, 2006.
    • (2006) CHES , pp. 399-413
    • Kulikowski, K.1    Smirnov, A.2    Taubin, A.3
  • 36
    • 27244458099 scopus 로고    scopus 로고
    • Security Evaluation Against Electromagnetic Analysis at Design Time
    • H. Li, A. Markettos, S. Moore "Security Evaluation Against Electromagnetic Analysis at Design Time" CHES, pp. 280-292, 2005.
    • (2005) CHES , pp. 280-292
    • Li, H.1    Markettos, A.2    Moore, S.3
  • 37
    • 33750700765 scopus 로고    scopus 로고
    • Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations
    • S. Mangard, K. Schramm "Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations" CHES, pp. 76-90, 2006.
    • (2006) CHES , pp. 76-90
    • Mangard, S.1    Schramm, K.2
  • 38
    • 34247278256 scopus 로고    scopus 로고
    • Power Attacks on Secure Hardware Based on Early Propagation of Data
    • K. J. Kulikowski, M. G. Karpovsky, A. Taubin "Power Attacks on Secure Hardware Based on Early Propagation of Data" IOLTS, pp. 131-138,2006.
    • (2006) IOLTS , pp. 131-138
    • Kulikowski, K.J.1    Karpovsky, M.G.2    Taubin, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.