메뉴 건너뛰기




Volumn 3017, Issue , 2004, Pages 279-298

ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware

Author keywords

Block cipher design; Efficient implementations; Reconfigurable hardware; Side channel resistance

Indexed keywords

COMPUTER HARDWARE; SEA ICE; SECURITY OF DATA; SIDE CHANNEL ATTACK;

EID: 35048901993     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-25937-4_18     Document Type: Article
Times cited : (80)

References (40)
  • 1
    • 35048856963 scopus 로고    scopus 로고
    • NIST Home page
    • NIST Home page, http://csrc.nist.gov/CryptoToolkit/aes/.
  • 2
    • 84954434858 scopus 로고    scopus 로고
    • The Block Cipher Rijndael
    • Smart Card Research and Applications, Springer-Verlag
    • J. Daemen, V. Rijmen, The Block Cipher Rijndael, Smart Card Research and Applications, pp 288-296, Springer-Verlag, LNCS 1820, 2000.
    • (2000) LNCS , vol.1820 , pp. 288-296
    • Daemen, J.1    Rijmen, V.2
  • 4
    • 33745766315 scopus 로고    scopus 로고
    • Submission to NESSIE project
    • M. Matsui, Supporting Document of MISTY1, , Submission to NESSIE project, available from http://www.cosic.esat.kuleuven.ac.be/nessie/
    • Supporting Document of MISTY1
    • Matsui, M.1
  • 7
    • 84944878412 scopus 로고    scopus 로고
    • High Performance Single Ship FPGA Rijndael Algorithm Implementations
    • the proceedings of CHES 2001: The Third International CHES Workshop, Lecture Notes In Computer Science, Springer-Verlag
    • M. McLoone and J. V. McCanny, High Performance Single Ship FPGA Rijndael Algorithm Implementations, in the proceedings of CHES 2001: The Third International CHES Workshop, Lecture Notes In Computer Science, LNCS2162, pp 65-76, Springer-Verlag.
    • LNCS , vol.2162 , pp. 65-76
    • McLoone, M.1    McCanny, J.V.2
  • 8
    • 0038557181 scopus 로고    scopus 로고
    • Two Methods of Rijndael Implementation in Reconfigurable Hardware
    • the proceedings of CHES 2001: The Third International CHES Workshop, Lecture Notes In Computer Science, Springer-Verlag
    • V. Fischer and M. Drutarovsky, Two Methods of Rijndael Implementation in Reconfigurable Hardware, in the proceedings of CHES 2001: The Third International CHES Workshop, Lecture Notes In Computer Science, LNCS2162, pp 65-76, Springer-Verlag.
    • LNCS , vol.2162 , pp. 65-76
    • Fischer, V.1    Drutarovsky, M.2
  • 9
    • 84946832086 scopus 로고    scopus 로고
    • A Compact Rijndael Hardware Architecture with S-Box Optimization
    • Advances in Cryptology - ASIACRYPT 2001, Springer-Verlag
    • A. Satoh et al, A Compact Rijndael Hardware Architecture with S-Box Optimization, Advances in Cryptology - ASIACRYPT 2001, LNCS 2248, pp239-254, Springer-Verlag.
    • LNCS , vol.2248 , pp. 239-254
    • Satoh, A.1
  • 13
    • 84903595110 scopus 로고
    • Differential cryptanalysis of DES-like cryptosystems
    • Proceedings of Crypto 90, Springer-Verlag
    • E. Biham, A. Shamir, Differential cryptanalysis of DES-like cryptosystems (Extended abstract), Proceedings of Crypto 90, pp 2-21, Springer-Verlag, LNCS 537, 1990.
    • (1990) LNCS , vol.537 , pp. 2-21
    • Biham, E.1    Shamir, A.2
  • 14
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for des cipher
    • Proceedings of EuroCrypt 93, Springer-Verlag
    • M. Matsui, Linear cryptanalysis method for DES cipher, Proceedings of EuroCrypt 93, pp 386-397, Springer-Verlag, LNCS 765, 1993.
    • (1993) LNCS , vol.765 , pp. 386-397
    • Matsui, M.1
  • 15
    • 84945126868 scopus 로고    scopus 로고
    • The Boomerang Attack
    • Proceedings of FSE 99, Springer-Verlag
    • D. Wagner, The Boomerang Attack, Proceedings of FSE 99, pp 156-170, Springer-Verlag, LNCS 1636, 1999.
    • (1999) LNCS , vol.1636 , pp. 156-170
    • Wagner, D.1
  • 16
    • 84945132264 scopus 로고    scopus 로고
    • The rectangle Attack - Rectangling the Serpent
    • Proceedings of Eurocrypt 2001, Springer-Verlag
    • E. Biham, O. Dunkelman, N. Keller, The rectangle Attack - Rectangling the Serpent, Proceedings of Eurocrypt 2001, pp 340-357, Springer-Verlag, LNCS 2045, 2001.
    • (2001) LNCS , vol.2045 , pp. 340-357
    • Biham, E.1    Dunkelman, O.2    Keller, N.3
  • 17
    • 84996804416 scopus 로고
    • Linear Cryptanalysis using Multiple Approximations
    • Proceedings of Crypto 94, Springer-Verlag
    • B. S. Kaliski, M. J. B. Robshaw, Linear Cryptanalysis using Multiple Approximations, Proceedings of Crypto 94, pp.26-39, Springer-Verlag, LNCS 0839, 1994.
    • (1994) LNCS , vol.839 , pp. 26-39
    • Kaliski, B.S.1    Robshaw, M.J.B.2
  • 18
    • 84947931044 scopus 로고    scopus 로고
    • Non-Linear Approximations in Linear Cryptanalysis
    • Proceedings of Eurocrypt 96, Springer-Verlag
    • L. Knudsen, M. J. B. Robshaw, Non-Linear Approximations in Linear Cryptanalysis, Proceedings of Eurocrypt 96, pp 224-236, Springer-Verlag, LNCS 1070, 1996.
    • (1996) LNCS , vol.1070 , pp. 224-236
    • Knudsen, L.1    Robshaw, M.J.B.2
  • 19
    • 84947444236 scopus 로고    scopus 로고
    • The Block Cipher SQUARE
    • Proceedings of FSE 1997, Springer-Verlag
    • J. Daemen, L. Knudsen, V. Rijmen, The Block Cipher SQUARE, Proceedings of FSE 1997, pp 149-165, Springer-Verlag, LNCS 1267, 1999.
    • (1999) LNCS , vol.1267 , pp. 149-165
    • Daemen, J.1    Knudsen, L.2    Rijmen, V.3
  • 20
    • 84974678303 scopus 로고    scopus 로고
    • Improved Cryptanalysis of Rijndael
    • Proceedings of FSE 2000, Springer-Verlag
    • N. Ferguson, J. Kelsey, S. Lucks, and al., Improved Cryptanalysis of Rijndael, Proceedings of FSE 2000, pp 213-230, Springer-Verlag, LNCS 1978, 2000.
    • (2000) LNCS , vol.1978 , pp. 213-230
    • Ferguson, N.1    Kelsey, J.2    Lucks, S.3
  • 21
    • 84948949623 scopus 로고
    • Truncated and Higher Order Differentials
    • Proceedings of FSE 94, Springer-Verlag
    • L. Knudsen, Truncated and Higher Order Differentials, Proceedings of FSE 94, pp 196-211, Springer-Verlag, LNCS 1008, 1995.
    • (1995) LNCS , vol.1008 , pp. 196-211
    • Knudsen, L.1
  • 22
    • 84957634424 scopus 로고    scopus 로고
    • Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
    • Proceedings of Eurocrypt 99, Springer-Verlag
    • E. Biham, A. Biryukov and A. Shamir, Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials, Proceedings of Eurocrypt 99, pp 12-23, Springer-Verlag, LNCS 1592, 1999.
    • (1999) LNCS , vol.1592 , pp. 12-23
    • Biham, E.1    Biryukov, A.2    Shamir, A.3
  • 23
    • 84957694360 scopus 로고    scopus 로고
    • Miss in the Middle Attacks on IDEA, Khufu, and Khafre
    • Proceedings of FSE 99, Springer-Verlag
    • E. Biham, A.Biryukov and A. Shamir, Miss in the Middle Attacks on IDEA, Khufu, and Khafre, Proceedings of FSE 99, pp 124-138, Springer-Verlag, LNCS 1636, 1999.
    • (1999) LNCS , vol.1636 , pp. 124-138
    • Biham, E.1    Biryukov, A.2    Shamir, A.3
  • 24
    • 84947929289 scopus 로고    scopus 로고
    • The Interpolation Attack on Block Ciphers
    • Proceedings of FSE 97, Springer-Verlag
    • T. Jakobsen and L. Knudsen, The Interpolation Attack on Block Ciphers, Proceedings of FSE 97, pp 28-40, Springer-Verlag, LNCS 1267, 1997.
    • (1997) LNCS , vol.1267 , pp. 28-40
    • Jakobsen, T.1    Knudsen, L.2
  • 25
    • 84957610784 scopus 로고    scopus 로고
    • Slide Attacks
    • Proceedings of FSE'99, Springer Verlag
    • A. Biryukov, D. Wagner, Slide Attacks, Proceedings of FSE'99, pp 245-259, Springer Verlag, LNCS 1636, 1999.
    • (1999) LNCS , vol.1636 , pp. 245-259
    • Biryukov, A.1    Wagner, D.2
  • 26
    • 84948988609 scopus 로고    scopus 로고
    • Advanced Slide Attacks
    • Proceedings of Eurocrypt 00, Springer Verlag
    • A. Biryukov, D. Wagner, Advanced Slide Attacks, Proceedings of Eurocrypt 00, pp 589-606, Springer Verlag, LNCS 1807, 2000.
    • (2000) LNCS , vol.1807 , pp. 589-606
    • Biryukov, A.1    Wagner, D.2
  • 27
    • 85006024828 scopus 로고
    • New Type of Cryptanalytic Attacks Using Related Key
    • Proceedings of Eurocrypt 93, Springer-Verlag
    • E. Biham, New Type of Cryptanalytic Attacks Using Related Key, Proceedings of Eurocrypt 93, pp 229-246, Springer-Verlag, LNCS 765, 1994.
    • (1994) LNCS , vol.765 , pp. 229-246
    • Biham, E.1
  • 28
    • 35048821959 scopus 로고
    • Related-Key Cryptanalysis of S-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
    • Proceedings of AusCrypt'92, Springer-Verlag
    • J. Kelsey, B. Schneier, D. Wagner, Related-Key Cryptanalysis of S-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA, Proceedings of AusCrypt'92, pp 196-208, Springer-Verlag, LNCS 718, 1993.
    • (1993) LNCS , vol.718 , pp. 196-208
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 29
    • 35048837087 scopus 로고    scopus 로고
    • Analysis of Involutional Ciphers: Khazad and Anubis
    • Springer-Verlag, to appear
    • A. Biryukov, Analysis of Involutional Ciphers: Khazad and Anubis, Proceedings of FSE 2003, Springer-Verlag, to appear.
    • Proceedings of FSE 2003
    • Biryukov, A.1
  • 30
    • 0000474763 scopus 로고    scopus 로고
    • Differential Power Analysis
    • the proceedings of CRYPTO 99, Springer-Verlag
    • P. Kocher, J. Jaffe, B. Jun, Differential Power Analysis, in the proceedings of CRYPTO 99, Lecture Notes in Computer Science 1666, pp 398-412, Springer-Verlag.
    • Lecture Notes in Computer Science , vol.1666
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 31
    • 84949520149 scopus 로고    scopus 로고
    • DES and Differential Power Analysis: The Duplication Method
    • the proceedings of CHES 1999, Springer-Verlag
    • L. Goubin, J. Patarin, DES and Differential Power Analysis: The Duplication Method, in the proceedings of CHES 1999, Lecture Notes in Computer Science 1717, pp 158-172, Springer-Verlag.
    • Lecture Notes in Computer Science , vol.1717 , pp. 158-172
    • Goubin, L.1    Patarin, J.2
  • 32
    • 84957079591 scopus 로고    scopus 로고
    • Towards Sound Approaches to Counteract Power-Analysis Attacks
    • the proceedings of CRYPTO 1999, Springer-Verlag
    • S. Chari et al., Towards Sound Approaches to Counteract Power-Analysis Attacks, in the proceedings of CRYPTO 1999, Lecture Notes in Computer Science 1666, pp 398-412, Springer-Verlag.
    • Lecture Notes in Computer Science , vol.1666 , pp. 398-412
    • Chari, S.1
  • 33
    • 35248899532 scopus 로고    scopus 로고
    • Template Attacks
    • the proceedings of CHES 2002, Springer-Verlag
    • S. Chari, J. Rao, P. Rohatgi, Template Attacks, in the proceedings of CHES 2002, Lecture Notes in Computer Science 2523, pp 13-28, Springer-Verlag.
    • Lecture Notes in Computer Science , vol.2523 , pp. 13-28
    • Chari, S.1    Rao, J.2    Rohatgi, P.3
  • 37
    • 35048891013 scopus 로고
    • Known Plaintext Cryptanalysis of Tree-Structured Block Ciphers
    • May
    • H. M. Heys, S. E. Tavares, Known Plaintext Cryptanalysis of Tree-Structured Block Ciphers, Electronics Letters, Vol. 31, pp 784-785, May 1995.
    • (1995) Electronics Letters , vol.31 , pp. 784-785
    • Heys, H.M.1    Tavares, S.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.