메뉴 건너뛰기




Volumn 4876 LNCS, Issue , 2007, Pages 110-125

Power analysis for secret recovering and reverse engineering of public key algorithms

Author keywords

Arithmetic coprocessors; Exponentiation; Public key cryptography; Reverse engineering; Side channel analysis

Indexed keywords

CORRELATION METHODS; DATA PRIVACY; INTRUSION DETECTION; PROGRAM PROCESSORS; REVERSE ENGINEERING;

EID: 38549098459     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77360-3_8     Document Type: Conference Paper
Times cited : (59)

References (23)
  • 3
    • 35048818034 scopus 로고    scopus 로고
    • Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 16-29. Springer, Heidelberg (2004)
    • Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
  • 4
    • 35248838910 scopus 로고    scopus 로고
    • den Boer, R., Lemke, K., Wicke, G.: A DPA attack against the modular reduction within a CRT implementation of RSA. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, 2523, pp. 228-243. Springer, Heidelberg (2003)
    • den Boer, R., Lemke, K., Wicke, G.: A DPA attack against the modular reduction within a CRT implementation of RSA. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 228-243. Springer, Heidelberg (2003)
  • 5
    • 33845395407 scopus 로고    scopus 로고
    • Side channel analysis for reverse engineering (SCARE), an improved attack against a secret A3/A8 GSM algorithm
    • Clavier, C.: Side channel analysis for reverse engineering (SCARE), an improved attack against a secret A3/A8 GSM algorithm. IACR Cryptology cprint archive (049) (2004)
    • (2004) IACR Cryptology cprint archive
    • Clavier, C.1
  • 6
    • 84880293917 scopus 로고    scopus 로고
    • Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 292-302. Springer, Heidelberg (1999)
    • Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292-302. Springer, Heidelberg (1999)
  • 9
    • 26444614207 scopus 로고    scopus 로고
    • Daudigny, R., Ledig, H., Muller, F., Valette, F.: Scare of the DES. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 393-406. Springer, Heidelberg (2005)
    • Daudigny, R., Ledig, H., Muller, F., Valette, F.: Scare of the DES. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 393-406. Springer, Heidelberg (2005)
  • 10
    • 38549138629 scopus 로고    scopus 로고
    • Joye, M.: Smart-card implementation of elliptic curve cryptography and DPA-type attacks. In: Quisquater, J.-J., Paradinas, P., Deswarte, Y., El Kalam, A.A. (eds.) CARDIS, pp. 115-126. Kluwer, Dordrecht (2004)
    • Joye, M.: Smart-card implementation of elliptic curve cryptography and DPA-type attacks. In: Quisquater, J.-J., Paradinas, P., Deswarte, Y., El Kalam, A.A. (eds.) CARDIS, pp. 115-126. Kluwer, Dordrecht (2004)
  • 12
    • 0030172012 scopus 로고    scopus 로고
    • Analysing and comparing Montgomery multiplication algorithms
    • Koç, Ç.K., Acar, T., Kaliski, B.-S.: Analysing and comparing Montgomery multiplication algorithms. IEEE Micro 16(3), 26-33 (1996)
    • (1996) IEEE Micro , vol.16 , Issue.3 , pp. 26-33
    • Koç, C.K.1    Acar, T.2    Kaliski, B.-S.3
  • 13
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
    • Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 14
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, N.: Elliptic curve cryptosystems. Math, of Comp. 48(177), 203-209 (1987)
    • (1987) Math, of Comp , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 15
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 16
    • 84949514743 scopus 로고    scopus 로고
    • Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 144-157. Springer, Heidelberg (1999)
    • Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 144-157. Springer, Heidelberg (1999)
  • 18
    • 0000838441 scopus 로고
    • Use of elliptic curves in cryptography
    • Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
    • Miller, V.S.: Use of elliptic curves in cryptography. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 489-502. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 489-502
    • Miller, V.S.1
  • 19
    • 84966243285 scopus 로고
    • Modular multiplication without trial division
    • Montgomery, P.L.: Modular multiplication without trial division. Mathematics of Computation 44(170), 519-521 (1985)
    • (1985) Mathematics of Computation , vol.44 , Issue.170 , pp. 519-521
    • Montgomery, P.L.1
  • 21
    • 0242372122 scopus 로고    scopus 로고
    • Novak, R.: Side-channel attack on substitution blocks. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, 2846, pp. 307-318. Springer, Heidelberg (2003)
    • Novak, R.: Side-channel attack on substitution blocks. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 307-318. Springer, Heidelberg (2003)
  • 22
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120-126 (1978)
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 23
    • 84944888189 scopus 로고    scopus 로고
    • Walter, C.D.: Sliding windows succumbs to big mac attack. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 286-299. Springer, Heidelberg (2001)
    • Walter, C.D.: Sliding windows succumbs to big mac attack. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 286-299. Springer, Heidelberg (2001)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.