메뉴 건너뛰기




Volumn 2523, Issue , 2003, Pages 13-28

Template Attacks

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; EMBEDDED SYSTEMS; HARDWARE; INFORMATION THEORY;

EID: 35248899532     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36400-5_3     Document Type: Article
Times cited : (866)

References (22)
  • 1
    • 84957018842 scopus 로고    scopus 로고
    • Low Cost Attacks on Tamper Resistant Devices Springer-Verlag
    • Proc. Security Protocols, 5th International Workshop, Paris, France, April
    • Ross Anderson and Markus Kühn. Low Cost Attacks on Tamper Resistant Devices. In Proc. Security Protocols, 5th International Workshop, Paris, France, Springer-Verlag LNCS Volume 1361 , pp 125-136, April 1997.
    • (1997) LNCS , vol.1361 , pp. 125-136
    • Anderson, R.1    Kühn, M.2
  • 2
    • 3042641393 scopus 로고    scopus 로고
    • On the Importance of Checking Cryptographic Protocols for Faults
    • Dan Boneh, Richard DeMillo and Richard Lipton. On the Importance of Checking Cryptographic Protocols for Faults. Journal of Cryptology, Springer-Verlag, Volume 14, Number 2, pp 101-119, 2001.
    • (2001) Journal of Cryptology, Springer-Verlag , vol.14 , Issue.2 , pp. 101-119
    • Boneh, D.1    Demillo, R.2    Lipton, R.3
  • 3
    • 84957079591 scopus 로고    scopus 로고
    • Towards Sound Countermeasures to Counteract Power-Analysis Attacks
    • Proc. Crypto '99, Springer-Verlag
    • Suresh Chari, Charanjit S. Jutla, Josyula R. Rao and Pankaj Rohatgi. Towards Sound Countermeasures to Counteract Power-Analysis Attacks. Proc. Crypto '99, Springer-Verlag, LNCS 1666, August 1999, pages 398-412.
    • (1999) LNCS , vol.1666
    • Chari, S.1    Jutla, C.S.2    Rao, J.R.3    Rohatgi, P.4
  • 4
    • 0012022904 scopus 로고    scopus 로고
    • A Cautionary Note Regarding the Evaluation of AES Candidates on Smart Cards
    • Rome, Italy, March
    • Suresh Chari, Charanjit S. Jutla, Josyula R. Rao and Pankaj Rohatgi. A Cautionary Note Regarding the Evaluation of AES Candidates on Smart Cards. Proc. Second AES Candidate Conference, Rome, Italy, March 1999.
    • (1999) Proc. Second AES Candidate Conference
    • Chari, S.1    Jutla, C.S.2    Rao, J.R.3    Rohatgi, P.4
  • 5
    • 68549099548 scopus 로고    scopus 로고
    • Differential Power Analysis in the Presence of Hardware Countermeasures
    • Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug., Springer-Verlag
    • Christopher Clavier, Jean-Sebastien Coron, and Nora Dabbous. Differential Power Analysis in the Presence of Hardware Countermeasures. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2000, LNCS 1965, Springer-Verlag, pp 252-263.
    • (2000) LNCS , vol.1965 , pp. 252-263
    • Clavier, C.1    Coron, J.-S.2    Dabbous, N.3
  • 6
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
    • Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug., Springer-Verlag
    • Jean-Sebastien Coron. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In Proc. Workshop on Cryptographic Hardware and Embedded Systems , Aug. 1999, LNCS 1717, Springer-Verlag, pp 292-302.
    • (1999) LNCS , vol.1717 , pp. 292-302
    • Coron, J.-S.1
  • 7
    • 68549105908 scopus 로고    scopus 로고
    • On Boolean and Arithmetic Masking against Differential Power Analysis
    • Proc, Workshop on Cryptographic Hardware and Embedded Systems, Aug., Springer-Verlag
    • Jean-Sebastien Coron, and Louis Goubin. On Boolean and Arithmetic Masking against Differential Power Analysis. In Proc, Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2000, LNCS 1965, Springer-Verlag, pp 231-237.
    • (2000) LNCS , vol.1965 , pp. 231-237
    • Coron, J.-S.1    Goubin, L.2
  • 8
    • 84942593174 scopus 로고    scopus 로고
    • IPA: A New Class of Power Attacks
    • Proc.Workshop on Cryptographic Hardware and Embedded Systems, Aug., Springer-Verlag
    • P.N. Fahn and P.K. Pearson. IPA: A New Class of Power Attacks. In Proc.Workshop on Cryptographic Hardware and Embedded Systems, Aug. 1999, LNCS 1717, Springer-Verlag, pp 173-186.
    • (1999) LNCS , vol.1717 , pp. 173-186
    • Fahn, P.N.1    Pearson, P.K.2
  • 10
    • 84949520149 scopus 로고    scopus 로고
    • DES and Differential Power Analysis
    • Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug., Springer-Verlag
    • L. Goubin and J. Patarin. DES and Differential Power Analysis. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug. 1999, LNCS 1717, Springer-Verlag, pp 158-172.
    • (1999) LNCS , vol.1717 , pp. 158-172
    • Goubin, L.1    Patarin, J.2
  • 11
    • 68549092452 scopus 로고    scopus 로고
    • Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for the Koblitz Curve Cryptosystems
    • Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug., Springer-Verlag
    • M.A. Hasan. Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for the Koblitz Curve Cryptosystems. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2000, LNCS 1965, Springer-Verlag, pp 93-108.
    • (2000) LNCS , vol.1965 , pp. 93-108
    • Hasan, M.A.1
  • 12
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis: Leaking Secrets
    • Proc. Crypto '99, Springer-Verlag
    • P. Kocher, J. Jaffe and B. Jun. Differential Power Analysis: Leaking Secrets. In Proc. Crypto '99, Springer-Verlag, LNCS 1666, pages 388-397.
    • LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 13
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems
    • Proc. Crypto '96, Springer-Verlag
    • P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems. In Proc. Crypto '96, LNCS 1109, Springer-Verlag, pp 104-113.
    • LNCS , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 14
  • 15
    • 68549126765 scopus 로고    scopus 로고
    • Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smart Cards
    • Proc. Workshop on Cryptographic Hardware and Embedded Systems, Worcester, MA, USA, Aug., Springer-Verlag
    • Rita Mayer-Sommer. Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smart Cards. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Worcester, MA, USA, Aug. 2000, LNCS 1965, Springer-Verlag, pp 78-92.
    • (2000) LNCS , vol.1965 , pp. 78-92
    • Mayer-Sommer, R.1
  • 16
    • 23044523291 scopus 로고    scopus 로고
    • Securing the AES Finalists Against Power Analysis Attacks
    • New York, NY, USA, April Springer-Verlag.
    • Thomas S. Messerges. Securing the AES Finalists Against Power Analysis Attacks. In Proc. Fast Software Encryption Workshop 2000, New York, NY, USA, April 2000, Springer-Verlag.
    • (2000) Proc. Fast Software Encryption Workshop 2000
    • Messerges, T.S.1
  • 17
    • 68549099555 scopus 로고    scopus 로고
    • Using Second-Order Power Analysis to Attack DPA Resistant Software
    • Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug., Springer-Verlag
    • Thomas S. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2000, LNCS 1965, Springer-Verlag, pp 238-251.
    • (2000) LNCS , vol.1965 , pp. 238-251
    • Messerges, T.S.1
  • 18
    • 84949514743 scopus 로고    scopus 로고
    • Power Analysis Attacks of Modular Exponentiation in Smart Cards
    • Proc. Workshop on Cryptographic Hardware and Embedded Systems 1999, Aug., Springer-Verlag
    • T.S. Messerges, E.A. Dabbish, and R.H. Sloan. Power Analysis Attacks of Modular Exponentiation in Smart Cards. In Proc. Workshop on Cryptographic Hardware and Embedded Systems 1999, Aug. 1999, LNCS 1717, Springer-Verlag, pp 144-157.
    • (1999) LNCS , vol.1717 , pp. 144-157
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 21
    • 68549107606 scopus 로고    scopus 로고
    • Protecting Smart Cards from Power Analysis with Detached Power Supplies
    • Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug., Springer-Verlag
    • Adi Shamir. Protecting Smart Cards from Power Analysis with Detached Power Supplies. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2000, LNCS 1965, Springer-Verlag, pp 71-77.
    • (2000) LNCS , vol.1965 , pp. 71-77
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.