메뉴 건너뛰기




Volumn 30, Issue 2, 2008, Pages 315-325

Differential side channel analysis attacks on FPGA implementions of ARIA

Author keywords

ARIA; Countermeasure; DEMA; DPA; FPGA; Side channel attacks

Indexed keywords

COMPUTER HARDWARE; ELECTROMAGNETISM; FIELD PROGRAMMABLE GATE ARRAYS (FPGA);

EID: 42149129401     PISSN: 12256463     EISSN: None     Source Type: Journal    
DOI: 10.4218/etrij.08.0107.0167     Document Type: Article
Times cited : (30)

References (29)
  • 1
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Proc. CRYPTO
    • P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," Proc. CRYPTO, LNCS 1666, 1999, pp. 388-397.
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 2
    • 35248847436 scopus 로고    scopus 로고
    • Power-Analysis Attacks on an FPGA: First Experimental Results
    • Proc. CHES
    • S.B. Ors, E. Oswald, and B. Preneel, "Power-Analysis Attacks on an FPGA: First Experimental Results," Proc. CHES, LNCS 2779, 2003, pp. 35-50.
    • (2003) LNCS , vol.2779 , pp. 35-50
    • Ors, S.B.1    Oswald, E.2    Preneel, B.3
  • 3
    • 3042545023 scopus 로고    scopus 로고
    • Power-Analysis Attack on an ASIC AES Implementation
    • S.B. Ors, F. Gurkaynak, E. Oswald, and B. Preneel, "Power-Analysis Attack on an ASIC AES Implementation," Proc. ITCC, vol. 2, 2004, pp. 546-552.
    • (2004) Proc. ITCC , vol.2 , pp. 546-552
    • Ors, S.B.1    Gurkaynak, F.2    Oswald, E.3    Preneel, B.4
  • 4
    • 24744465637 scopus 로고    scopus 로고
    • Power Analysis of an FPGA Implementation of Rijndael: Is Pipelining a DPA Countermeasurer?
    • Proc. CHES
    • F. Standaert, S. Örs, and B. Preneel, "Power Analysis of an FPGA Implementation of Rijndael: Is Pipelining a DPA Countermeasurer?" Proc. CHES, LNCS 3156, 2004, pp. 30-44.
    • (2004) LNCS , vol.3156 , pp. 30-44
    • Standaert, F.1    Örs, S.2    Preneel, B.3
  • 5
    • 33748999531 scopus 로고    scopus 로고
    • Updates on the Security of FPGAs against Power Analysis Attacks
    • Proc. CHES
    • F.X Standaert, F. Mace, and J.J. Quisquater, "Updates on the Security of FPGAs against Power Analysis Attacks," Proc. CHES, LNCS 3985, 2006, pp. 335-346.
    • (2006) LNCS , vol.3985 , pp. 335-346
    • Standaert, F.X.1    Mace, F.2    Quisquater, J.J.3
  • 7
    • 33646407063 scopus 로고    scopus 로고
    • Differential Power Analysis on Block Cipher ARIA
    • Proc. HPCC
    • J. Ha, C. Kim, S. Moon, I. Park, and H. Yoo, "Differential Power Analysis on Block Cipher ARIA," Proc. HPCC, LNCS 3726,2005, pp. 541-548.
    • (2005) LNCS , vol.3726 , pp. 541-548
    • Ha, J.1    Kim, C.2    Moon, S.3    Park, I.4    Yoo, H.5
  • 8
    • 38049161288 scopus 로고    scopus 로고
    • Investigations of Power Analysis Attacks and Coimterrneasures for ARIA
    • Proc. WISA'06
    • H. Yoo, C. Herbst, S. Mangard, E. Oswald, and S. Moon, 'Investigations of Power Analysis Attacks and Coimterrneasures for ARIA,"Proc. WISA'06,LNCS 4298, 2007.
    • (2007) LNCS , vol.4298
    • Yoo, H.1    Herbst, C.2    Mangard, S.3    Oswald, E.4    Moon, S.5
  • 9
    • 35248862449 scopus 로고    scopus 로고
    • Hectromagnetic Analysis: Concrete Results
    • Proc. CHES
    • K. Gandolfi, C. Mourtel, and F. Olivier, 'Hectromagnetic Analysis: Concrete Results," Proc. CHES,LNCS 2162, 2001, pp. 251-261.
    • (2001) LNCS , vol.2162 , pp. 251-261
    • Gandolfi, K.1    Mourtel, C.2    Olivier, F.3
  • 10
    • 84946832086 scopus 로고    scopus 로고
    • A Compact Rijndael Hardware Architecture with S-Box Optimization
    • Proc. ASIACRYPT
    • A Satoh, S. Morioka, K. Takano, and S. Munetoh, "A Compact Rijndael Hardware Architecture with S-Box Optimization," Proc. ASIACRYPT, LNCS 2248, 2001, pp. 239-254.
    • (2001) LNCS , vol.2248 , pp. 239-254
    • Satoh, A.1    Morioka, S.2    Takano, K.3    Munetoh, S.4
  • 11
    • 34547479335 scopus 로고    scopus 로고
    • Unified Hardware Architecture for 128-bit Block Cipher AES and Camellia, Proa CHES
    • A Satoh and S. Morioka, "Unified Hardware Architecture for 128-bit Block Cipher AES and Camellia," Proa CHES, LNCS 2779, 2003, pp. 304-318.
    • (2003) LNCS , vol.2779 , pp. 304-318
    • Satoh, A.1    Morioka, S.2
  • 12
    • 34547466844 scopus 로고    scopus 로고
    • The Smallest ARIA Module with 16Bit Architecture
    • Proc. ICISC
    • S. Yang, J. Park, and Y. You, "The Smallest ARIA Module with 16Bit Architecture," Proc. ICISC, LNCS 4296, 2006, pp. 107-117.
    • (2006) LNCS , vol.4296 , pp. 107-117
    • Yang, S.1    Park, J.2    You, Y.3
  • 13
    • 35048818034 scopus 로고    scopus 로고
    • Correlation Power Analysis with a Leakage Model
    • Proc. CHES
    • E. Brier, C. Clavier, and F. Olivier, "Correlation Power Analysis with a Leakage Model," Proc. CHES, LNCS 3156, 2004, pp. 16-29.
    • (2004) LNCS , vol.3156 , pp. 16-29
    • Brier, E.1    Clavier, C.2    Olivier, F.3
  • 15
    • 23944499474 scopus 로고    scopus 로고
    • Advances in Side-Channel Cryptanalysis, Hectromagnetic Analysis and Template Attacks
    • D. Agrowal, B. Archambeault, S. Chari, P. Rohatgi, and J. Rao, "Advances in Side-Channel Cryptanalysis, Hectromagnetic Analysis and Template Attacks," Cryptobytes, vol. 6, no. 1, 2003, pp. 20-32.
    • (2003) Cryptobytes , vol.6 , Issue.1 , pp. 20-32
    • Agrowal, D.1    Archambeault, B.2    Chari, S.3    Rohatgi, P.4    Rao, J.5
  • 16
    • 27244449350 scopus 로고    scopus 로고
    • EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA
    • Proc. CHES
    • C.H. Gebotys, S. Ho, and C.C. Tiu, "EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA," Proc. CHES, LNCS 3659, 2005, pp. 250-264.
    • (2005) LNCS , vol.3659 , pp. 250-264
    • Gebotys, C.H.1    Ho, S.2    Tiu, C.C.3
  • 17
    • 42149123932 scopus 로고    scopus 로고
    • LANGER EMV-Technik, http//www.langer-emv.de/en/produ kte/prod_rf2.htm/.
    • Technik
  • 18
    • 35048819488 scopus 로고    scopus 로고
    • Hardware Countermeasures against DPA: A Statistical Analysis of Their Effectiveness
    • Proc. CT-RSA
    • S. Mangard, "Hardware Countermeasures against DPA: A Statistical Analysis of Their Effectiveness," Proc. CT-RSA, LNCS 2964, 2004, pp. 222-235.
    • (2004) LNCS , vol.2964 , pp. 222-235
    • Mangard, S.1
  • 19
    • 24144459808 scopus 로고    scopus 로고
    • Side-Channel Leakage of Masked CMOS Gates
    • Proc. CT-RSA
    • S. Mangard, T. Popp, and BM Gammel, "Side-Channel Leakage of Masked CMOS Gates," Proc. CT-RSA, LNCS 3376, 2005, pp. 351-365.
    • (2005) LNCS , vol.3376 , pp. 351-365
    • Mangard, S.1    Popp, T.2    Gammel, B.M.3
  • 20
    • 27244451021 scopus 로고    scopus 로고
    • Successfully Attacking Masked AES Hardware Irnplementations, Proa CHES
    • S. Mangard, N. Pramstaller, and E. Oswald, "Successfully Attacking Masked AES Hardware Irnplementations," Proa CHES, LNCS 3659, 2005, pp. 157-171.
    • (2005) LNCS , vol.3659 , pp. 157-171
    • Mangard, S.1    Pramstaller, N.2    Oswald, E.3
  • 21
    • 27244432772 scopus 로고    scopus 로고
    • Masking at Gate Level in the Presence of Glitches
    • Proc. CHES
    • W. Fischer and B.M. Gammel, "Masking at Gate Level in the Presence of Glitches," Proc. CHES, LNCS 3659, 2005, pp. 187-200.
    • (2005) LNCS , vol.3659 , pp. 187-200
    • Fischer, W.1    Gammel, B.M.2
  • 22
    • 33750700765 scopus 로고    scopus 로고
    • Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations
    • Proc. CHES
    • S. Mangard and K. Schramm "Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations," Proc. CHES, LNCS 4249, 2006, pp. 76-90.
    • (2006) LNCS , vol.4249 , pp. 76-90
    • Mangard, S.1    Schramm, K.2
  • 23
    • 68549099555 scopus 로고
    • Using Second-Order Power Analysis to Attack DPA Resistant Software
    • Proc. CHES'00
    • T. Messerges, "Using Second-Order Power Analysis to Attack DPA Resistant Software," Proc. CHES'00, LNCS 1965, 2004, pp. 238-251.
    • (1965) LNCS , pp. 238-251
    • Messerges, T.1
  • 24
    • 35048870686 scopus 로고    scopus 로고
    • Towards Efficient Second-Order Power Analysis
    • Proc. CHES
    • J. Waddle and D. Wagner, "Towards Efficient Second-Order Power Analysis," Proc. CHES, LNCS 3156, 2004, pp. 1-15.
    • (2004) LNCS , vol.3156 , pp. 1-15
    • Waddle, J.1    Wagner, D.2
  • 25
    • 24744434942 scopus 로고    scopus 로고
    • On the Masking Countermeasure and Higher-Order Power Analysis Attacks
    • F. Standaert, E. Peeters, and J. Quisquater, "On the Masking Countermeasure and Higher-Order Power Analysis Attacks," Proc. ITCC, vol 1,2005, pp. 562-567.
    • (2005) Proc. ITCC , vol.1 , pp. 562-567
    • Standaert, F.1    Peeters, E.2    Quisquater, J.3
  • 26
    • 27244453895 scopus 로고    scopus 로고
    • On Second-Order Differential Power Analysis
    • Proc. CHES
    • M. Joye, P. Paillier, and B. Schoenmakers, "On Second-Order Differential Power Analysis," Proc. CHES, LNCS 3659, 2005, pp. 293-308.
    • (2005) LNCS , vol.3659 , pp. 293-308
    • Joye, M.1    Paillier, P.2    Schoenmakers, B.3
  • 27
    • 27244438087 scopus 로고    scopus 로고
    • Improved Higher Order Side-Channel Attacks with FPGA Experiments
    • Proc. CHES
    • E. Peeters, F. Standaert, N. Donckers, and J. Quisquater, '"Improved Higher Order Side-Channel Attacks with FPGA Experiments," Proc. CHES, LNCS 3659, 2005, pp. 309-323.
    • (2005) LNCS , vol.3659 , pp. 309-323
    • Peeters, E.1    Standaert, F.2    Donckers, N.3    Quisquater, J.4
  • 28
    • 33745679179 scopus 로고    scopus 로고
    • E. Oswald, S. Mangard, C. Herbst, and S. Tillich, Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers, Proc. CT-RSA, LNCS 3860, 2006, pp. 192-207.
    • E. Oswald, S. Mangard, C. Herbst, and S. Tillich, "Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers," Proc. CT-RSA, LNCS 3860, 2006, pp. 192-207.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.