메뉴 건너뛰기




Volumn 2779, Issue , 2003, Pages 113-124

Parity-based concurrent error detection of substitution-permutation network block ciphers

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CONVOLUTIONAL CODES; EMBEDDED SYSTEMS; ERROR DETECTION; LYAPUNOV METHODS; RECONFIGURABLE HARDWARE; SECURITY OF DATA;

EID: 35248863449     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45238-6_10     Document Type: Article
Times cited : (111)

References (22)
  • 2
    • 0026397734 scopus 로고
    • Differential Cryptanalysis of DES-like Crytptosystems
    • E. Biham and A. Shamir, "Differential Cryptanalysis of DES-like Crytptosystems", Journal of Cryptography, Vol. 4, No. 1, pp. 3-72, 1991.
    • (1991) Journal of Cryptography , vol.4 , Issue.1 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 3
    • 85025704284 scopus 로고
    • Linear Cryptanalysis Method for des Cipher
    • Springer-Verlag
    • M. Matsui, "Linear Cryptanalysis Method for DES Cipher," Proceedings of Advances in Cryptology-Eurocrypt, Springer-Verlag, pp. 386-397, 1994.
    • (1994) Proceedings of Advances in Cryptology-Eurocrypt , pp. 386-397
    • Matsui, M.1
  • 4
  • 5
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • Proceedings of Eurocrypt, Lecture Notes in Computer Science, Springer-Verlag
    • D. Boneh, R. DeMillo, and R. Lipton, "On the importance of checking cryptographic protocols for faults", Proceedings of Eurocrypt, Lecture Notes in Computer Science, Springer-Verlag, LNCS 1233, pp. 37-51, 1997.
    • (1997) LNCS , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.2    Lipton, R.3
  • 6
    • 0003291909 scopus 로고    scopus 로고
    • Differential Fault Analysis of Secret Key Cryptosystems
    • Aug
    • E. Biham and A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems", Proceedings of Crypto, Aug 1997.
    • (1997) Proceedings of Crypto
    • Biham, E.1    Shamir, A.2
  • 7
    • 0000694402 scopus 로고    scopus 로고
    • Low cost attack on tamper resistant devices
    • th International Workshop on Security Protocols, Lecture Notes in Computer Sciences, Springer-Verlag
    • th International Workshop on Security Protocols, Lecture Notes in Computer Sciences, Springer-Verlag, LNCS 1361, 1997.
    • (1997) LNCS , vol.1361
    • Anderson, R.J.1    Kuhn, M.2
  • 14
    • 0036913523 scopus 로고    scopus 로고
    • Concurrent Error Detection of Fault Based Side-Channel Cryptanalysis of 128-Bit Symmetric Block Ciphers
    • Dec
    • R Karri, K. Wu, P. Mishra and Y. Kim, "Concurrent Error Detection of Fault Based Side-Channel Cryptanalysis of 128-Bit Symmetric Block Ciphers," IEEE Transactions on CAD, Dec 2002.
    • (2002) IEEE Transactions on CAD
    • Karri, R.1    Wu, K.2    Mishra, P.3    Kim, Y.4
  • 15
    • 84948745350 scopus 로고    scopus 로고
    • On the propagation of faults and their detection in a hardware implementation of the advanced encryption standard
    • G. Bertoni, L. Breveglieri, I. Koren and V. Piuri, "On the propagation of faults and their detection in a hardware implementation of the advanced encryption standard," Proceedings of ASAP'02, pp. 303-312, 2002.
    • (2002) Proceedings of ASAP'02 , pp. 303-312
    • Bertoni, G.1    Breveglieri, L.2    Koren, I.3    Piuri, V.4
  • 17
    • 35248851909 scopus 로고    scopus 로고
    • "DES encryption and decryption unit with error checking," US patent US5432848, Jul 1995
    • A. S. Butter, C. Y. Kao and J. P. Kuruts, "DES encryption and decryption unit with error checking," US patent US5432848, Jul 1995.
    • Butter, A.S.1    Kao, C.Y.2    Kuruts, J.P.3
  • 19
    • 0037624935 scopus 로고    scopus 로고
    • Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard
    • April
    • G. Bertoni, L. Breveglieri, I. Koren, and V. Piuri, "Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard," IEEE Transactions on Computers, vol. 52, No. 4, pp. 492-505, April 2003.
    • (2003) IEEE Transactions on Computers , vol.52 , Issue.4 , pp. 492-505
    • Bertoni, G.1    Breveglieri, L.2    Koren, I.3    Piuri, V.4
  • 20
    • 85020573990 scopus 로고
    • On the design of S-boxes
    • Proceedings of CRYPTO '85, Springer Verlag Lecture Notes in Computer Science
    • A. F. Webster and S. E. Tavares. "On the design of S-boxes," Proceedings of CRYPTO '85, Springer Verlag Lecture Notes in Computer Science, LNCS 218, pp. 523-534, 1986.
    • (1986) LNCS , vol.218 , pp. 523-534
    • Webster, A.F.1    Tavares, S.E.2
  • 21
    • 78149236064 scopus 로고
    • Avalanche characteristics of substitution permutation encryption networks
    • Sep
    • H. Heys and S. E. Tavares, "Avalanche characteristics of substitution permutation encryption networks," IEEE Transactions on Computers, vol. 44, no. 9, pp. 1131-1139, Sep 1995.
    • (1995) IEEE Transactions on Computers , vol.44 , Issue.9 , pp. 1131-1139
    • Heys, H.1    Tavares, S.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.