메뉴 건너뛰기




Volumn , Issue , 2007, Pages 489-492

RIJID: Random code injection to mask power analysis based side channel attacks

Author keywords

Cross correlation; Pattern matching; Power analysis; Random instruction injection; Side channel attack

Indexed keywords

ALGORITHMS; COMPUTER CRIME; CRYPTOGRAPHY; PATTERN MATCHING; SECURITY OF DATA;

EID: 34547280256     PISSN: 0738100X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DAC.2007.375214     Document Type: Conference Paper
Times cited : (48)

References (25)
  • 1
    • 34547231019 scopus 로고    scopus 로고
    • The PEAS Team, Available at
    • The PEAS Team. ASIP Meister, 2002. Available at: http://www.eda-meister. org/asipmeister.
    • (2002) ASIP Meister
  • 2
    • 84937438279 scopus 로고    scopus 로고
    • Power analysis, what is now possible
    • London, UK, Springer-Verlag
    • M.-L. Akkar, R. Bevan, P. Dischamp, and D. Moyart. Power analysis, what is now possible... In Asiacrypt '00, pages 489-502, London, UK, 2000. Springer-Verlag.
    • (2000) Asiacrypt '00 , pp. 489-502
    • Akkar, M.-L.1    Bevan, R.2    Dischamp, P.3    Moyart, D.4
  • 3
    • 33646826538 scopus 로고    scopus 로고
    • On the automatic construction of indistinguishable operations
    • November
    • M. Barbosa and D. Page. On the automatic construction of indistinguishable operations. In Cryptography And Coding, pages 233-247, November 2005.
    • (2005) Cryptography And Coding , pp. 233-247
    • Barbosa, M.1    Page, D.2
  • 4
    • 85032541897 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • August
    • D. Brumley and D. Boneh. Remote timing attacks are practical. In USENIX, August 2003.
    • (2003) USENIX
    • Brumley, D.1    Boneh, D.2
  • 5
    • 84957079591 scopus 로고    scopus 로고
    • Towards sound approaches to counteract power-analysis attacks
    • S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi. Towards sound approaches to counteract power-analysis attacks. In CRYPTO, pages 398-412, 1999.
    • (1999) CRYPTO , pp. 398-412
    • Chari, S.1    Jutla, C.S.2    Rao, J.R.3    Rohatgi, P.4
  • 6
    • 68549099548 scopus 로고    scopus 로고
    • Differential power analysis in the presence of hardware countermeasures
    • London, UK
    • C. Clavier, J.-S. Coron, and N. Dabbous. Differential power analysis in the presence of hardware countermeasures. In Ches '00, pages 252-263, London, UK, 2000.
    • (2000) Ches '00 , pp. 252-263
    • Clavier, C.1    Coron, J.-S.2    Dabbous, N.3
  • 7
    • 68549105908 scopus 로고    scopus 로고
    • On boolean and arithmetic masking against differential power analysis
    • London, UK, Springer-Verlag
    • J.-S. Coron and L. Goubin. On boolean and arithmetic masking against differential power analysis. In Ches '00, pages 231-237, London, UK, 2000. Springer-Verlag.
    • (2000) Ches '00 , pp. 231-237
    • Coron, J.-S.1    Goubin, L.2
  • 8
    • 33746866764 scopus 로고    scopus 로고
    • C. Gebotys. A Table Masking Countermeasure for Low-Energy Secure Embedded Systems. IEEE Trans. on VLSI, 14(7):740-753, 2006.
    • C. Gebotys. A Table Masking Countermeasure for Low-Energy Secure Embedded Systems. IEEE Trans. on VLSI, 14(7):740-753, 2006.
  • 9
    • 35248815162 scopus 로고    scopus 로고
    • Secure elliptic curve implementations: An analysis of resistance to power-attacks in a dsp processor
    • London, UK, Springer-Verlag
    • C. H. Gebotys and R. J. Gebotys. Secure elliptic curve implementations: An analysis of resistance to power-attacks in a dsp processor. In CHES '02:, pages 114-128, London, UK, 2003. Springer-Verlag.
    • (2003) CHES '02 , pp. 114-128
    • Gebotys, C.H.1    Gebotys, R.J.2
  • 10
    • 84949520149 scopus 로고    scopus 로고
    • Des and differential power analysis (the "duplication" method)
    • London, UK, Springer-Verlag
    • L. Goubin and J. Patarin. Des and differential power analysis (the "duplication" method). In Ches '99, pages 158-172, London, UK, 1999. Springer-Verlag.
    • (1999) Ches '99 , pp. 158-172
    • Goubin, L.1    Patarin, J.2
  • 11
    • 84948778220 scopus 로고    scopus 로고
    • Instruction stream mutation for non-deterministic processors
    • Washington, DC, USA
    • J. Irwin, D. Page, and N. P. Smart. Instruction stream mutation for non-deterministic processors. In Asap '02, page 286, Washington, DC, USA, 2002.
    • (2002) Asap '02 , pp. 286
    • Irwin, J.1    Page, D.2    Smart, N.P.3
  • 12
    • 35248892041 scopus 로고    scopus 로고
    • S. Mangard. A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. In icisc 2002, 2587, pages 343-358, 2003.
    • S. Mangard. A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. In icisc 2002, volume 2587, pages 343-358, 2003.
  • 13
    • 84958757658 scopus 로고    scopus 로고
    • Non-deterministic processors
    • London, UK, Springer-Verlag
    • D. May, H. L. Muller, and N. P. Smart. Non-deterministic processors. In Acisp '01, pages 115-129, London, UK, 2001. Springer-Verlag.
    • (2001) Acisp '01 , pp. 115-129
    • May, D.1    Muller, H.L.2    Smart, N.P.3
  • 14
    • 84944906595 scopus 로고    scopus 로고
    • Random register renaming to foil dpa
    • London, UK, Springer-Verlag
    • D. May, H. L. Muller, and N. P. Smart. Random register renaming to foil dpa. In Ches '01, pages 28-38, London, UK, 2001. Springer-Verlag.
    • (2001) Ches '01 , pp. 28-38
    • May, D.1    Muller, H.L.2    Smart, N.P.3
  • 15
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Computers, 51(5):541-552, 2002.
    • (2002) IEEE Trans. Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 16
    • 16244378918 scopus 로고    scopus 로고
    • Current flattening in software and hardware for security applications
    • R. Muresan and C. H. Gebotys. Current flattening in software and hardware for security applications. In CODES+ISSS, pages 218-223, 2004.
    • (2004) CODES+ISSS , pp. 218-223
    • Muresan, R.1    Gebotys, C.H.2
  • 17
    • 3042545023 scopus 로고    scopus 로고
    • Power-analysis attack on an asic aes implementation
    • 02:546
    • S.B. Ors, E Gurkaynak, E. Oswald, and B. Preneel. Power-analysis attack on an asic aes implementation, itcc, 02:546, 2004.
    • (2004) itcc
    • Ors, S.B.1    Gurkaynak, E.2    Oswald, E.3    Preneel, B.4
  • 18
    • 33745679179 scopus 로고    scopus 로고
    • Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers
    • Springer
    • E. Oswald, S. Mangard, C. Herbst, and S. Tillich. Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. In ct-rsa 2006, pages 192-207. Springer, 2006.
    • (2006) ct-rsa 2006 , pp. 192-207
    • Oswald, E.1    Mangard, S.2    Herbst, C.3    Tillich, S.4
  • 21
    • 78650238574 scopus 로고    scopus 로고
    • Electromagnetic analysis (ema): Measures and counter-measures for smart cards
    • J.-J. Quisquater and D. Samyde. Electromagnetic analysis (ema): Measures and counter-measures for smart cards. In E-smart, pages 200-210, 2001.
    • (2001) E-smart , pp. 200-210
    • Quisquater, J.-J.1    Samyde, D.2
  • 24
    • 24744434942 scopus 로고    scopus 로고
    • On the Masking Countermeasure and Higher-Order Power Analysis Attacks
    • E-X. Standaert, E. Peeters, and J.-J. Quisquater. On the Masking Countermeasure and Higher-Order Power Analysis Attacks. In ITCC 2005, pages 562-567, 2005.
    • (2005) ITCC 2005 , pp. 562-567
    • Standaert, E.-X.1    Peeters, E.2    Quisquater, J.-J.3
  • 25
    • 27944462240 scopus 로고    scopus 로고
    • A side-channel leakage free coprocessor ic in 0.18um cmos for embedded aes-based cryptographic and biometric processing
    • New York, NY, USA, ACM Press
    • K.Tiri, D. Hwang, A. Hodjat, B. Lai, S. Yang, P. Schaumont, and I. Verbauwhede. A side-channel leakage free coprocessor ic in 0.18um cmos for embedded aes-based cryptographic and biometric processing. In Dac '05, pages 222-227, New York, NY, USA, 2005. ACM Press.
    • (2005) Dac '05 , pp. 222-227
    • Tiri, K.1    Hwang, D.2    Hodjat, A.3    Lai, B.4    Yang, S.5    Schaumont, P.6    Verbauwhede, I.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.