메뉴 건너뛰기




Volumn 4727 LNCS, Issue , 2007, Pages 303-319

Power analysis resistant AES implementation with instruction set extensions

Author keywords

Advanced encryption standard; Embedded RISC processor; Instruction set extensions; Power analysis; SCA resistance; SPARC V8 architecture

Indexed keywords

ALGORITHMS; COMPUTER SOFTWARE; COSTS; REDUCED INSTRUCTION SET COMPUTING; SECURITY SYSTEMS; SYSTEMS ANALYSIS;

EID: 38049064919     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74735-2_21     Document Type: Conference Paper
Times cited : (24)

References (17)
  • 1
    • 34547420633 scopus 로고    scopus 로고
    • Bertoni, C., Breveglieri, L., Farina, R., Regazzoni, F.: Speeding Up AES By Extending a 32-Bit Processor Instruction Set. In: Proceedings of the IEEE 17th International Conference on Application-specific Systems, Architectures and Processors (ASAP'06), pp. 275-282. IEEE Computer Society, Los Alamitos (2006)
    • Bertoni, C., Breveglieri, L., Farina, R., Regazzoni, F.: Speeding Up AES By Extending a 32-Bit Processor Instruction Set. In: Proceedings of the IEEE 17th International Conference on Application-specific Systems, Architectures and Processors (ASAP'06), pp. 275-282. IEEE Computer Society, Los Alamitos (2006)
  • 2
    • 35048848490 scopus 로고    scopus 로고
    • Blömer, J., Guajardo, J., Krummel, V.: Provably Secure Masking of AES. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, 3357, pp. 69-83. Springer, Heidelberg (2004)
    • Blömer, J., Guajardo, J., Krummel, V.: Provably Secure Masking of AES. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 69-83. Springer, Heidelberg (2004)
  • 3
    • 33846588491 scopus 로고    scopus 로고
    • Bucci, M., Guglielmo, M., Luzzi, R., Trifiletti, A.: A Power Consumption Randomization Countermeasure for DPA-Resistant Cryptographic Processors. In: Mach, E., Paliouras, V., Koufopavlou, O. (eds.) PATMOS 2004. LNCS, 3254, pp. 481-490. Springer, Heidelberg (2004)
    • Bucci, M., Guglielmo, M., Luzzi, R., Trifiletti, A.: A Power Consumption Randomization Countermeasure for DPA-Resistant Cryptographic Processors. In: Mach, E., Paliouras, V., Koufopavlou, O. (eds.) PATMOS 2004. LNCS, vol. 3254, pp. 481-490. Springer, Heidelberg (2004)
  • 5
    • 33750709739 scopus 로고    scopus 로고
    • m). In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 133-147. Springer, Heidelberg (2004)
    • m). In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 133-147. Springer, Heidelberg (2004)
  • 8
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
    • Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 10
    • 17044372839 scopus 로고    scopus 로고
    • Extended Instructions for the AES Cryptography and their Efficient Implementation
    • Austin, Texas, USA, pp, IEEE Press, Los Alamitos
    • Nadehara, K., Ikekawa, M., Kuroda, I.: Extended Instructions for the AES Cryptography and their Efficient Implementation. In: IEEE Workshop on Signal Processing Systems (SIPS'04), Austin, Texas, USA, pp. 152-157. IEEE Press, Los Alamitos (2004)
    • (2004) IEEE Workshop on Signal Processing Systems (SIPS'04) , pp. 152-157
    • Nadehara, K.1    Ikekawa, M.2    Kuroda, I.3
  • 11
    • 34547695808 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST, Standard November, Available online at
    • National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard (November 2001), Available online at http://www.itl.nist. gov/fipspubs/
    • (2001) FIPS-197: Advanced Encryption
  • 12
    • 38049002716 scopus 로고    scopus 로고
    • Schgaguler, K.: Assay of the DPA Vulnerability of Micro Electric Circuits Based on FPGA Measurements. Master's thesis, Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010 Graz, Austria (October 2005)
    • Schgaguler, K.: Assay of the DPA Vulnerability of Micro Electric Circuits Based on FPGA Measurements. Master's thesis, Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010 Graz, Austria (October 2005)
  • 13
    • 0033716116 scopus 로고    scopus 로고
    • Bit Permutation Instructions for Accelerating Software Cryptography
    • Swartzlander, E.E, Jullien, CA, Schulte, M.J, eds, Boston, MA, USA, 10-12 July, IEEE Computer Society Press, Los Alamitos () 2000
    • Shi, Z., Lee, R.B.: Bit Permutation Instructions for Accelerating Software Cryptography. In: Swartzlander, E.E., Jullien, CA., Schulte, M.J. (eds.) 12th IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP 2000), Boston, MA, USA, 10-12 July 2000, pp. 138-148. IEEE Computer Society Press, Los Alamitos (2000)
    • (2000) 12th IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP , pp. 138-148
    • Shi, Z.1    Lee, R.B.2
  • 14
    • 33750697230 scopus 로고    scopus 로고
    • Tillich, S., Großschädl, J.: Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 270-284. Springer, Heidelberg (2006)
    • Tillich, S., Großschädl, J.: Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 270-284. Springer, Heidelberg (2006)
  • 15
    • 38049073937 scopus 로고    scopus 로고
    • Protecting AES Software Implementations on 32-bit Processors against Power Analysis
    • ACNS, Springer, Heidelberg to be published
    • Tillich, S., Herbst, C., Mangard, S.: Protecting AES Software Implementations on 32-bit Processors against Power Analysis. In: ACNS 2007. LNCS, vol. 4521, pp. 141-157, Springer, Heidelberg (to be published, 2007)
    • (2007) LNCS , vol.4521 , pp. 141-157
    • Tillich, S.1    Herbst, C.2    Mangard, S.3
  • 16
    • 27244438768 scopus 로고    scopus 로고
    • Tiri, K., Hwang, D., Hodjat, A., Lai, B.-C., Yang, S., Schaumont, P., Verbauwhede, I.: Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, 3659, pp. 354-365. Springer, Heidelberg (2005)
    • Tiri, K., Hwang, D., Hodjat, A., Lai, B.-C., Yang, S., Schaumont, P., Verbauwhede, I.: Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 354-365. Springer, Heidelberg (2005)
  • 17
    • 3042604811 scopus 로고    scopus 로고
    • A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation
    • Paris, France, 16-20 February, IEEE Computer Society, Los Alamitos () 2004
    • Tiri, K., Verbauwhede, I.: A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. In: 2004 Design, Automation and Test in Europe Conference and Exposition (DATE 2004), Paris, France, 16-20 February 2004, vol. 1, pp. 246-251. IEEE Computer Society, Los Alamitos (2004)
    • (2004) 2004 Design, Automation and Test in Europe Conference and Exposition (DATE , vol.1 , pp. 246-251
    • Tiri, K.1    Verbauwhede, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.