메뉴 건너뛰기




Volumn 2779, Issue , 2003, Pages 17-34

Hidden Markov model cryptanalysis

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; EMBEDDED SYSTEMS; LOGIC CIRCUITS; MARKOV PROCESSES; SIDE CHANNEL ATTACK; TRELLIS CODES;

EID: 35248868313     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45238-6_3     Document Type: Article
Times cited : (48)

References (18)
  • 3
    • 0842327123 scopus 로고    scopus 로고
    • A fast parallel elliptic curve multiplication resistant against side channel attacks
    • Izu, T., Takagi, T.: A fast parallel elliptic curve multiplication resistant against side channel attacks. In: PKC2002. (2002)
    • (2002) PKC2002
    • Izu, T.1    Takagi, T.2
  • 4
    • 35248829928 scopus 로고    scopus 로고
    • MIST: An efficient, randomized exponentiation algorithm for resisting power analysis
    • Walter, C.: MIST: An efficient, randomized exponentiation algorithm for resisting power analysis. In: RSA 2002 - Cryptographers' Track. (2002)
    • (2002) RSA 2002 - Cryptographers' Track
    • Walter, C.1
  • 10
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Lecture Notes in Computer Science 1109 (1996) 104-113
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 13
    • 35248817249 scopus 로고    scopus 로고
    • On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between addition and doubling
    • Okeya, K., Sakurai, K.: On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between addition and doubling. In: The 7th Australasian Conference on Information Security and Privacy. (2002)
    • (2002) The 7th Australasian Conference on Information Security and Privacy
    • Okeya, K.1    Sakurai, K.2
  • 14
    • 33645596424 scopus 로고    scopus 로고
    • Security constraints on the Oswald-Aigner exponentiation algorithm
    • Walter, C.: Security constraints on the Oswald-Aigner exponentiation algorithm. Cryptology ePrint Archive: http://eprint.iacr.org/ (2003)
    • (2003) Cryptology ePrint Archive
    • Walter, C.1
  • 17
    • 35248828008 scopus 로고    scopus 로고
    • Technical Report UCB//CSD-03-1244, University of California at Berkeley
    • Karlof, C., Wagner, D.: Hidden Markov Model Cryptanalysis. Technical Report UCB//CSD-03-1244, University of California at Berkeley (2003)
    • (2003) Hidden Markov Model Cryptanalysis
    • Karlof, C.1    Wagner, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.