메뉴 건너뛰기




Volumn 2729, Issue , 2003, Pages 463-481

Private circuits: Securing hardware against probing attacks

Author keywords

Circuit complexity; Cryptanalysis; Provable security; Secure multiparty computation; Side channel attacks

Indexed keywords

BRAIN; CRYPTOGRAPHY; ELECTRIC NETWORK ANALYSIS; HARDWARE; HARDWARE SECURITY;

EID: 35248830337     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45146-4_27     Document Type: Article
Times cited : (751)

References (38)
  • 2
    • 0002380073 scopus 로고    scopus 로고
    • Tamper Resistance - A Cautionary Note
    • USENIX Press
    • R. Anderson, M. Kuhn, "Tamper Resistance - A Cautionary Note," USENIX E-Commerce Workshop, USENIX Press, 1996, pp.1-11.
    • (1996) USENIX E-Commerce Workshop , pp. 1-11
    • Anderson, R.1    Kuhn, M.2
  • 3
    • 0141481639 scopus 로고    scopus 로고
    • Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
    • Springer
    • R. Anderson, M. Kuhn, "Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations," Proc. 2nd Workshop on Information Hiding, Springer, 1998.
    • (1998) Proc. 2nd Workshop on Information Hiding
    • Anderson, R.1    Kuhn, M.2
  • 5
    • 85154002090 scopus 로고
    • Sorting Networks and their Applications
    • K. Batcher. Sorting Networks and their Applications. In Proc. AFiPS Spring Joint Conference, Vol. 32, 1988, pp. 307-314.
    • (1988) Proc. AFiPS Spring Joint Conference , vol.32 , pp. 307-314
    • Batcher, K.1
  • 6
    • 0002531104 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • M. Ben-Or, S. Goldwasser, and A. Widgerson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. of 20th STOC, 1988.
    • (1988) Proc. of 20th STOC
    • Ben-Or, M.1    Goldwasser, S.2    Widgerson, A.3
  • 7
    • 84957355967 scopus 로고    scopus 로고
    • On the Importance of Checking Cryptographic Protocols for Faults
    • Springer-Verlag
    • D. Boneh, R.A. Demillo, R.J. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults," EUROCRYPT'97, Springer-Verlag, 1997, pp.37-51.
    • (1997) EUROCRYPT'97 , pp. 37-51
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 8
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and composition of multiparty cryptographic protocols. In J. of Cryptology, 13(1), 2000.
    • (2000) J. of Cryptology , vol.13 , Issue.1
    • Canetti, R.1
  • 10
    • 84984842401 scopus 로고    scopus 로고
    • Maintaining Security in the Presence of Transient Faults
    • R. Canetti and A. Herzberg. Maintaining Security in the Presence of Transient Faults. In CRYPTO 1994, pages 425-438.
    • CRYPTO 1994 , pp. 425-438
    • Canetti, R.1    Herzberg, A.2
  • 11
    • 84957079591 scopus 로고    scopus 로고
    • Towards Sound Approaches to Counteract Power-Analysis Attacks
    • Springer-Verlag
    • S. Chari, C.S. Jutla, J.R. Rao, P. Rohatgi, "Towards Sound Approaches to Counteract Power-Analysis Attacks," CRYPTO'99, Springer-Verlag, 1999, pp.398-412.
    • (1999) CRYPTO'99 , pp. 398-412
    • Chari, S.1    Jutla, C.S.2    Rao, J.R.3    Rohatgi, P.4
  • 13
    • 0002626155 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret-sharing scheme
    • R. Cramer, I. Damgård, and U. Maurer. General secure multi-party computation from any linear secret-sharing scheme. In Proc. of EUROCRYPT '00.
    • Proc. of EUROCRYPT '00
    • Cramer, R.1    Damgård, I.2    Maurer, U.3
  • 14
    • 68549105908 scopus 로고    scopus 로고
    • On Boolean and Arithmetic Masking against Differential Power Analysis
    • Springer-Verlag
    • J.-S. Coron, L. Goubin, "On Boolean and Arithmetic Masking against Differential Power Analysis," CHES'00, Springer-Verlag, pp.231-237.
    • CHES'00 , pp. 231-237
    • Coron, J.-S.1    Goubin, L.2
  • 15
    • 0004777155 scopus 로고    scopus 로고
    • Resistance Against Implementation Attacks: A Comparative Study of the AES Proposals
    • Mar.
    • J. Daemen, V. Rijmen, "Resistance Against Implementation Attacks: A Comparative Study of the AES Proposals," AES'99, Mar. 1999.
    • (1999) AES'99
    • Daemen, J.1    Rijmen, V.2
  • 16
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic Analysis: Concrete Results
    • CHES'01, Springer-Verlag
    • K. Gandolfi, C. Mourtel, F. Olivier, "Electromagnetic Analysis: Concrete Results," CHES'01, LNCS 2162, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2162
    • Gandolfi, K.1    Mourtel, C.2    Olivier, F.3
  • 17
    • 17444394365 scopus 로고    scopus 로고
    • Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
    • R. Gennaro, M. O. Rabin, and T. Rabin. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In Proc. of 17th PODC, 1998.
    • (1998) Proc. of 17th PODC
    • Gennaro, R.1    Rabin, M.O.2    Rabin, T.3
  • 18
    • 0022793132 scopus 로고
    • How to construct random functions
    • October
    • O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. JACM, 33(4):792-807, October 1986.
    • (1986) JACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 20
    • 0030149547 scopus 로고    scopus 로고
    • Software Protection and Simulation on Oblivious RAMs
    • O. Goldreich and R. Ostrovsky. Software Protection and Simulation on Oblivious RAMs. JACM 43(3): 431-473, 1996.
    • (1996) JACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 21
    • 84949520149 scopus 로고    scopus 로고
    • DES and Differential Power Analysis - The Duplication Method
    • Springer-Verlag
    • L. Goubin, J. Patarin, "DES and Differential Power Analysis - The Duplication Method," CHES'99, Springer-Verlag, 1999, pp.158-172.
    • (1999) CHES'99 , pp. 158-172
    • Goubin, L.1    Patarin, J.2
  • 22
    • 84974731648 scopus 로고    scopus 로고
    • Robustness for free in unconditional multi-party computation
    • M. Hirt and U. Maurer. Robustness for free in unconditional multi-party computation. In Proc. of CRYPTO '01.
    • Proc. of CRYPTO '01
    • Hirt, M.1    Maurer, U.2
  • 24
    • 84958769993 scopus 로고    scopus 로고
    • Side Channel Cryptanalysis of Product Ciphers
    • ESORICS'98, Springer-Verlag
    • J. Kelsey, B. Schneier, D. Wagner, "Side Channel Cryptanalysis of Product Ciphers," ESORICS'98, LNCS 1485, Springer-Verlag, 1998.
    • (1998) LNCS , vol.1485
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 25
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Springer-Verlag
    • P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," CRYPTO'96, Springer-Verlag, 1996, pp.104-113.
    • (1996) CRYPTO'96 , pp. 104-113
    • Kocher, P.1
  • 26
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Springer-Verlag
    • P. Kocher, J. Jaffe, B. Jun, "Differential Power Analysis," CRYPTO'99, Springer-Verlag, 1999, pp.388-397.
    • (1999) CRYPTO'99 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 27
    • 23044523291 scopus 로고    scopus 로고
    • Securing the AES Finalists Against Power Analysis Attacks
    • Springer-Verlag
    • T.S. Messerges, "Securing the AES Finalists Against Power Analysis Attacks," FSE'00, Springer-Verlag, 2000.
    • (2000) FSE'00
    • Messerges, T.S.1
  • 32
    • 33746082293 scopus 로고    scopus 로고
    • Eddy current for Magnetic Analysis with Active Sensor
    • Sept.
    • J.-J. Quisquater, D. Samyde, "Eddy current for Magnetic Analysis with Active Sensor," Esmart 2002, Sept. 2002.
    • (2002) Esmart 2002
    • Quisquater, J.-J.1    Samyde, D.2
  • 33
    • 78650238574 scopus 로고    scopus 로고
    • ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
    • Esmart 2001, Springer-Verlag
    • J.-J. Quisquater, D. Samyde, "ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards," Esmart 2001, LNCS 2140, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2140
    • Quisquater, J.-J.1    Samyde, D.2
  • 36
    • 0022218742 scopus 로고
    • Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk
    • W. van Eck, "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk," Computers & Security, v.4, 1985, pp.269-286.
    • (1985) Computers & Security , vol.4 , pp. 269-286
    • Van Eck, W.1
  • 37
    • 0038794800 scopus 로고
    • Viking Penguin Inc.
    • D. Wright, Spycatcher, Viking Penguin Inc., 1987.
    • (1987) Spycatcher
    • Wright, D.1
  • 38
    • 0003113271 scopus 로고
    • How to generate and exchange secrets
    • A. C. Yao. How to generate and exchange secrets. In Proc. of 27th FOCS, 1986.
    • (1986) Proc. of 27th FOCS
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.