메뉴 건너뛰기




Volumn 2779, Issue , 2003, Pages 62-76

Cryptanalysis of DES implemented on computers with cache

Author keywords

AES; Cache; Camellia; DES; Side channel; Timing attacks

Indexed keywords

CODES (SYMBOLS); EMBEDDED SYSTEMS; PERSONAL COMPUTERS; SIDE CHANNEL ATTACK; STANDARDS;

EID: 35248855964     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45238-6_6     Document Type: Article
Times cited : (185)

References (12)
  • 1
    • 84958641478 scopus 로고    scopus 로고
    • Differential Fault Analysis of Secret Key Cryptosystems
    • CRYPTO'97
    • E. Biham, A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems," CRYPTO'97, LNCS1294, pp. 513-525, 1997.
    • (1997) LNCS , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 3
    • 1542520946 scopus 로고    scopus 로고
    • Information-Technology Promotion Agency, Japan and Telecomminications AdvancementOrganization of Japan, "CRYPTREC Report 2001," 2002.
    • (2002) CRYPTREC Report 2001
  • 5
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • CRYPTO'99, Springer-Verlag
    • P. Kocher, J. Jaffe, B. Jun, "Differential Power Analysis," CRYPTO'99, LNCS1666, pp. 388-397. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 6
    • 24144497857 scopus 로고    scopus 로고
    • A Timing Attack against Rijndael
    • F. Koeune, J.J. Quisquater, "A Timing Attack against Rijndael," UCL Report, CG1999-1, 1999, available at http://www.dice.ucl.ac.be/crypto/techreports.html
    • (1999) UCL Report, CG1999-1
    • Koeune, F.1    Quisquater, J.J.2
  • 9
    • 1942457187 scopus 로고    scopus 로고
    • Technical Report CSTR-02-003, Department of Computer Science, University of Bristol, June
    • D. Page, "Theoretical Use of Cache memory as a Cryptanalytic side-Channel," Technical Report CSTR-02-003, Department of Computer Science, University of Bristol, June 2002 available at http://www.cs.bris.ac.uk/
    • (2002) Theoretical Use of Cache Memory As a Cryptanalytic Side-Channel
    • Page, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.