메뉴 건너뛰기




Volumn 2523, Issue , 2003, Pages 228-243

A DPA Attack against the Modular Reduction within a CRT Implementation of RSA

Author keywords

CRT; DPA; Modular reduction; Power analysis; RSA; Side channel analysis; Smartcard

Indexed keywords

CATHODE RAY TUBES; CRYPTOGRAPHY; EMBEDDED SYSTEMS; HARDWARE; INPUT OUTPUT PROGRAMS; SIDE CHANNEL ATTACK; SMART CARDS;

EID: 35248838910     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Article
Times cited : (65)

References (13)
  • 1
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Lecture Notes in Computer Science, Springer, Berlin
    • P. Kocher, J. Jaffe and B. Jun, "Differential Power Analysis", in: Proceedings of Advances in Cryptology - CRYPTO '99, Lecture Notes in Computer Science, Vol. 1666, Springer, Berlin 1999, pp. 388-397
    • (1999) Proceedings of Advances in Cryptology - CRYPTO '99 , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 2
    • 84949514743 scopus 로고    scopus 로고
    • Power Analysis Attacks of Modular Exponentiation in Smartcards
    • Springer, Lecture Notes in Computer Science, Springer, Berlin
    • T. S. Messerges, E. A. Dabbish and R. H. Sloan, "Power Analysis Attacks of Modular Exponentiation in Smartcards", in: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Springer, Lecture Notes in Computer Science, Vol. 1717, Springer, Berlin 1999, pp. 144-157
    • (1999) Proceedings of Workshop on Cryptographic Hardware and Embedded Systems , vol.1717 , pp. 144-157
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 3
    • 84958769993 scopus 로고    scopus 로고
    • Side Channel Cryptanalysis of Product Ciphers
    • Lecture Notes in Computer Science, Springer, Berlin
    • J. Kelsey, B. Schneier, D. Wagner, C. Hall, "Side Channel Cryptanalysis of Product Ciphers", in: Computer Security - ESORICS 98, Lecture Notes in Computer Science, Vol. 1485, Springer, Berlin 1998, pp. 487-496
    • (1998) Computer Security - ESORICS 98 , vol.1485 , pp. 487-496
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3    Hall, C.4
  • 5
    • 84944319704 scopus 로고    scopus 로고
    • Statistics and Secret Leakage
    • Lecture Notes in Computer Science, Springer, Berlin
    • J.-S. Coron, P. Kocher, D. Naccache, "Statistics and Secret Leakage", in: Financial Cryptography 2000, Lecture Notes in Computer Science, Vol. 1962, Springer, Berlin 2001, pp. 157-173
    • (2001) Financial Cryptography 2000 , vol.1962 , pp. 157-173
    • Coron, J.-S.1    Kocher, P.2    Naccache, D.3
  • 6
    • 68549099555 scopus 로고    scopus 로고
    • Using Second-Order Power Analysis to Attack DPA Resistant Software
    • Lecture Notes in Computer Science, Springer, Berlin
    • T. S. Messerges, "Using Second-Order Power Analysis to Attack DPA Resistant Software", in: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, Vol. 1965, Springer, Berlin 2000, pp. 238-251
    • (2000) Proceedings of Workshop on Cryptographic Hardware and Embedded Systems , vol.1965 , pp. 238-251
    • Messerges, T.S.1
  • 7
    • 68549126765 scopus 로고    scopus 로고
    • Smartly Analyzing the Simplicity nd the Power of Simple Power Analysis on Smartcards
    • Lecture Notes in Computer Science, Springer, Berlin
    • R. Mayer-Sommer, "Smartly Analyzing the Simplicity nd the Power of Simple Power Analysis on Smartcards", in: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, Vol. 1965, Springer, Berlin 2000, pp. 78-92
    • (2000) Proceedings of Workshop on Cryptographic Hardware and Embedded Systems , vol.1965 , pp. 78-92
    • Mayer-Sommer, R.1
  • 9
    • 84957355967 scopus 로고    scopus 로고
    • On the Importance of Checking Cryptographic Protocols for Faults
    • Lecture Notes in Computer Science, Springer, Berlin
    • D. Boneh, R. A. DeMillo, R. J. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults", in Advances in Cryptology - Eurocrypt 97, Lecture Notes in Computer Science, Vol. 1233, Springer, Berlin 1997, pp. 37-51
    • (1997) Advances in Cryptology - Eurocrypt 97 , vol.1233 , pp. 37-51
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 10
    • 84958641478 scopus 로고    scopus 로고
    • Differential Fault Analysis of Secret Key Cryptosystems
    • Lecture Notes in Computer Science, Springer, Berlin
    • E. Biham and A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems", in: Advances in Cryptology - Crypto '97, Lecture Notes in Computer Science, Vol. 1294, Springer, Berlin 1997, pp. 513-525
    • (1997) Advances in Cryptology - Crypto '97 , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 11
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Systems
    • Lecture Notes in Computer Science, Springer, Berlin
    • P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Systems", in: Advances in Cryptology - Crypto '96, Lecture Notes in Computer Science, Vol. 1109, Springer, Berlin 1996, pp. 104-113
    • (1996) Advances in Cryptology - Crypto '96 , vol.1109 , pp. 104-113
    • Kocher, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.