메뉴 건너뛰기




Volumn 2779, Issue , 2003, Pages 77-88

A differential fault attack technique against SPN structures, with application to the AES and KHAZAD

Author keywords

AES; Block Ciphers; Fault Attacks; Side channel Attacks

Indexed keywords

EMBEDDED SYSTEMS; SECURITY OF DATA; SIDE CHANNEL ATTACK; STANDARDS;

EID: 35248837397     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45238-6_7     Document Type: Article
Times cited : (503)

References (13)
  • 2
    • 84957018842 scopus 로고    scopus 로고
    • Low cost attacks on tamper resistant devices
    • Proc. of 1997 Security Protocols Workshop, Springer
    • R. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. In Proc. of 1997 Security Protocols Workshop, volume 1361 of Lecture Notes in Computer Science, pages 125-136. Springer, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1361 , pp. 125-136
    • Anderson, R.1    Kuhn, M.2
  • 4
    • 0026397734 scopus 로고
    • Differential cryptanalysis of DES-like cryptosystems
    • E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1):3-72, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.1 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 5
    • 84958641478 scopus 로고    scopus 로고
    • Differential Fault Analysis of Secret Key Cryptosystems
    • B. Kaliski, editor, Advances in Cryptology - CRYPTO '97, Springer
    • E. Biham and A. Shamir. Differential Fault Analysis of Secret Key Cryptosystems. In B. Kaliski, editor, Advances in Cryptology - CRYPTO '97, volume 1294 of Lecture Notes in Computer Science, pages 513-525. Springer, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 6
    • 35248884880 scopus 로고    scopus 로고
    • Fault based cryptanalysis of the Advanced Encryption Standard
    • To appear in Financial Cryptography '03, Springer
    • J. Blömer and J.-P. Seifert. Fault based cryptanalysis of the Advanced Encryption Standard. To appear in Financial Cryptography '03, LNCS. Springer, 2003. Also available at http://eprint.iacr.org/, 2002/075.
    • (2003) LNCS
    • Blömer, J.1    Seifert, J.-P.2
  • 7
    • 84957355967 scopus 로고    scopus 로고
    • On the Importance of Checking Cryptographic Protocols for Faults
    • (Extended Abstract). In W. Fumy, editor, Advances in Cryptology - EUROCRYPT '97, Springer
    • D. Boneh, R. A. DeMillo, and R. J. Lipton. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). In W. Fumy, editor, Advances in Cryptology - EUROCRYPT '97, volume 1233 of Lecture Notes in Computer Science, pages 37-51. Springer, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 8
    • 3042641393 scopus 로고    scopus 로고
    • On the Importance of Eliminating Errors in Cryptographic Computations
    • D. Boneh, R. A. DeMillo, and R. J. Lipton. On the Importance of Eliminating Errors in Cryptographic Computations. In Journal of Cryptology 14(2), pages 101-120, 2001.
    • (2001) Journal of Cryptology , vol.14 , Issue.2 , pp. 101-120
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 9
    • 0004181422 scopus 로고    scopus 로고
    • AES proposal: Rijndael
    • August
    • J. Daemen and V. Rijmen. AES proposal: Rijndael. In Proc. first AES conference, August 1998. Available on-line from the official AES page: http://csrc.nist.gov/CryptoToolkit/aes/rijndael/Bijndael.pdf.
    • (1998) Proc. First AES Conference
    • Daemen, J.1    Rijmen, V.2
  • 11
  • 13
    • 35248813476 scopus 로고    scopus 로고
    • Optical fault induction attacks
    • Burton S. Kaliski, Çetin K. Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, Springer
    • S. Skorobogatov and R. Anderson. Optical fault induction attacks. In Burton S. Kaliski, Çetin K. Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, volume 2523 of Lecture Notes in Computer Science. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2523
    • Skorobogatov, S.1    Anderson, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.