메뉴 건너뛰기




Volumn 2964, Issue , 2004, Pages 222-235

Hardware countermeasures against DPA - A statistical analysis of their effectiveness

Author keywords

Differential Power analysis (DPA); Hardware countermeasures; Side Channel Attacks; Smart cards

Indexed keywords

CRYPTOGRAPHY; DESIGN; HARDWARE; RECONFIGURABLE HARDWARE; SMART CARDS;

EID: 35048819488     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24660-2_18     Document Type: Article
Times cited : (226)

References (22)
  • 3
    • 68549099548 scopus 로고    scopus 로고
    • Differential Power Analysis in the presence of Hardware Countermeasures
    • Workshop on Cryptographic Hardware and Embedded Systems - CHES 2000, Springer-Verlag
    • C. Clavier, J.-S. Coron, and N. Dabbous. Differential Power Analysis in the presence of Hardware Countermeasures. In Workshop on Cryptographic Hardware and Embedded Systems - CHES 2000, volume 1965 of Lecture Notes in Computer Science (LNCS), pages 252-263. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science (LNCS) , vol.1965 , pp. 252-263
    • Clavier, C.1    Coron, J.-S.2    Dabbous, N.3
  • 4
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
    • Workshop on Cryptographic Hardware and Embedded Systems - CHES 1999, Springer-Verlag
    • J.-S. Coron. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In Workshop on Cryptographic Hardware and Embedded Systems - CHES 1999, volume 1717 of Lecture Notes in Computer Science (LNCS), pages 292-302. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science (LNCS) , vol.1717 , pp. 292-302
    • Coron, J.-S.1
  • 5
    • 0041695788 scopus 로고    scopus 로고
    • Multiplicative Masking and Power Analysis of AES
    • Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag
    • J. Dj. Golic and C. Tymen. Multiplicative Masking and Power Analysis of AES. In Cryptographic Hardware and Embedded Systems - CHES 2002, Lecture Notes in Computer Science (LNCS). Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science (LNCS)
    • Golic, J.Dj.1    Tymen, C.2
  • 6
    • 84944879586 scopus 로고    scopus 로고
    • A Sound Method for Switching between Boolean and Arithmetic Masking
    • Workshop on Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag
    • L. Goubin. A Sound Method for Switching between Boolean and Arithmetic Masking. In Workshop on Cryptographic Hardware and Embedded Systems - CHES 2001, volume 2162 of Lecture Notes in Computer Science (LNCS), pages 3-15. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science (LNCS) , vol.2162 , pp. 3-15
    • Goubin, L.1
  • 7
    • 84949520149 scopus 로고    scopus 로고
    • DES and Differential Power Analysis - The Duplication Method
    • Cryptographic Hardware and Embedded Systems - CHES 1999, Springer-Verlag
    • L. Goubin and J. Patarin. DES and Differential Power Analysis - The Duplication Method. In Cryptographic Hardware and Embedded Systems - CHES 1999, volume 1717 of Lecture Notes in Computer Science, pages 158-172. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1717 , pp. 158-172
    • Goubin, L.1    Patarin, J.2
  • 9
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Related Attacks
    • Advances in Cryptology - CRYPTO 1996, Springer-Verlag
    • P.C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Related Attacks. In Advances in Cryptology - CRYPTO 1996, volume 1109 of Lecture Notes in Computer Science, pages 104-113. Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 10
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Advances in Cryptology - CRYPTO 1999, Springer-Verlag
    • P.C. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In Advances in Cryptology - CRYPTO 1999, volume 1666 of Lecture Notes in Computer Science (LNCS), pages 388-397. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science (LNCS) , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 11
    • 35248892041 scopus 로고    scopus 로고
    • A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion
    • Information Security and Cryptology - ICISC 2002, Springer-Verlag
    • S. Mangard. A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. In Information Security and Cryptology - ICISC 2002, volume 2587 of Lecture Notes in Computer Science (LNCS), pages 343-358. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science (LNCS) , vol.2587 , pp. 343-358
    • Mangard, S.1
  • 12
    • 84958757658 scopus 로고    scopus 로고
    • Non-deterministic Processors
    • Information Security and Privacy - ACISP 2001, Springer-Verlag
    • D. May, H.L. Muller, and N.P. Smart. Non-deterministic Processors. In Information Security and Privacy - ACISP 2001, volume 2119 of Lecture Notes in Computer Science (LNCS), pages 115-129. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science (LNCS) , vol.2119 , pp. 115-129
    • May, D.1    Muller, H.L.2    Smart, N.P.3
  • 13
    • 68549099555 scopus 로고    scopus 로고
    • Using Second-Order Power Analysis to Attack DPA Resistant Software
    • Cryptographic Hardware and Embedded Systems - CHES 2000, Springer-Verlag
    • T.S. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Cryptographic Hardware and Embedded Systems - CHES 2000, volume 1965 of Lecture Notes in Computer Science (LNCS), pages 238-251. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science (LNCS) , vol.1965 , pp. 238-251
    • Messerges, T.S.1
  • 14
    • 84949514743 scopus 로고    scopus 로고
    • Power Analysis Attacks of Modular Exponentiation in Smartcards
    • Cryptographic Hardware and Embedded Systems - CHES 1999, Springer-Verlag
    • T.S. Messerges, E. A. Dabbish, and R. H. Sloan. Power Analysis Attacks of Modular Exponentiation in Smartcards. In Cryptographic Hardware and Embedded Systems - CHES 1999, volume 1717 of Lecture Notes in Computer Science, pages 144-157. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1717 , pp. 144-157
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 15
  • 18
    • 35248821853 scopus 로고    scopus 로고
    • Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems
    • Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag
    • E. Oswald. Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems. In Cryptographic Hardware and Embedded Systems - CHES 2002, volume 2523 of Lecture Notes in Computer Science (LNCS), pages 82-97. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science (LNCS) , vol.2523 , pp. 82-97
    • Oswald, E.1
  • 20
    • 84893732023 scopus 로고    scopus 로고
    • A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards
    • K. Tiri, M. Akmal, and I. Verbauwhede. A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards. In 29th European Solid-State Circuits Conference - ESSCIRC 2002, 2002.
    • (2002) 29th European Solid-State Circuits Conference - ESSCIRC 2002
    • Tiri, K.1    Akmal, M.2    Verbauwhede, I.3
  • 21
    • 35248825993 scopus 로고    scopus 로고
    • Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology
    • Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag
    • K. Tiri and I. Verbauwhede. Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology. In Cryptographic Hardware and Embedded Systems - CHES 2003, volume 2779 of Lecture Notes in Computer Science (LNCS), pages 125-136. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science (LNCS) , vol.2779 , pp. 125-136
    • Tiri, K.1    Verbauwhede, I.2
  • 22
    • 35048820406 scopus 로고    scopus 로고
    • Simplified Adaptive Multiplicative Masking for AES and its Secure Implementation
    • Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag
    • E. Trichina, D. De Seta, and L. Germani. Simplified Adaptive Multiplicative Masking for AES and its Secure Implementation. In Cryptographic Hardware and Embedded Systems - CHES 2002, Lecture Notes in Computer Science (LNCS). Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science (LNCS)
    • Trichina, E.1    De Seta, D.2    Germani, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.