메뉴 건너뛰기




Volumn 5479 LNCS, Issue , 2009, Pages 462-482

A leakage-resilient mode of operation

Author keywords

[No Author keywords available]

Indexed keywords

AMOUNT OF INFORMATION; CRYPTOGRAPHIC PRIMITIVES; MODE OF OPERATIONS; PSEUDO RANDOM; PSEUDO-RANDOM FUNCTIONS; SIDE CHANNEL ATTACK;

EID: 67650675583     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01001-9_27     Document Type: Conference Paper
Times cited : (176)

References (42)
  • 1
    • 77952407699 scopus 로고    scopus 로고
    • Simultaneous hardcore bits and cryptography against memory attacks
    • Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: TCC (2009)
    • TCC 2009
    • Akavia, A.1    Goldwasser, S.2    Vaikuntanathan, V.3
  • 3
    • 84958641478 scopus 로고    scopus 로고
    • Differential Fault Analysis of Secret Key Cryptosystems
    • Advances in Cryptology - CRYPTO '97
    • Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.1294, pp. 513-525. Springer, Heidelberg (1997) (Pubitemid 127112576)
    • (1997) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 4
    • 84957355967 scopus 로고    scopus 로고
    • On the Importance of Checking Cryptographic Protocols for Faults
    • Advances in Cryptology - Eurocrypt '97
    • Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.1233, pp. 37-51. Springer, Heidelberg (1997) (Pubitemid 127067792)
    • (1997) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1233 , pp. 37-51
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 5
    • 49049102095 scopus 로고    scopus 로고
    • How to protect yourself without perfect shredding
    • In: Aceto, L., Damg̊ard, I., Goldberg, L.A., Halld́orsson, M.M., Inǵolfsd́ottir, A., Walukiewicz, I. (eds.) LNCS, Springer, Heidelberg
    • Canetti, R., Eiger, D., Goldwasser, S., Lim, D.-Y.: How to protect yourself without perfect shredding. In: Aceto, L., Damg̊ard, I., Goldberg, L.A., Halld́orsson, M.M., Inǵolfsd́ottir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol.5126, pp. 511-523. Springer, Heidelberg (2008)
    • (2008) ICALP 2008 , vol.5126 , Issue.PART 2 , pp. 511-523
    • Canetti, R.1    Eiger, D.2    Goldwasser, S.3    Lim, D.-Y.4
  • 6
    • 38049016824 scopus 로고    scopus 로고
    • Intrusionresilient key exchange in the bounded retrieval model
    • In: Vadhan,S.P. (ed.) LNCS, Springer, Heidelberg
    • Cash, D.M., Ding, Y.Z., Dodis, Y., Lee, W., Lipton, R.J., Walfish, S.: Intrusionresilient key exchange in the bounded retrieval model. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol.4392, pp. 479-498. Springer, Heidelberg (2007)
    • (2007) TCC 2007 , vol.4392 , pp. 479-498
    • Cash, D.M.1    Ding, Y.Z.2    Dodis, Y.3    Lee, W.4    Lipton, R.J.5    Walfish, S.6
  • 7
    • 35248899532 scopus 로고    scopus 로고
    • Template attacks
    • In: Kaliski Jr.B.S.Ko̧c, ÇK., Paar, C. (eds.) LNCS, Springer, Heidelberg
    • Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski Jr., B.S., Ko̧c, Ç .K., Paar, C. (eds.) CHES 2002. LNCS, vol.2523, pp. 13-28. Springer, Heidelberg (2003)
    • (2003) CHES 2002 , vol.2523 , pp. 13-28
    • Chari, S.1    Rao, J.R.2    Rohatgi, P.3
  • 8
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • In: Ko̧c, ÇK., Paar, C. (eds.) LNCS, Springer, Heidelberg
    • Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Ko̧c, Ç .K., Paar, C. (eds.) CHES 1999. LNCS, vol.1717, p. 292. Springer, Heidelberg (1999)
    • (1999) CHES 1999 , vol.1717 , pp. 292
    • Coron, J.-S.1
  • 9
    • 50249137714 scopus 로고    scopus 로고
    • Algebraic and slide attacks on keeLoq
    • In: Nyberg,K. (ed.) LNCS, Springer, Heidelberg
    • Courtois, N.T., Bard, G.V., Wagner, D.: Algebraic and slide attacks on keeLoq. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.5086, pp. 97-115. Springer, Heidelberg (2008)
    • (2008) FSE 2008 , vol.5086 , pp. 97-115
    • Courtois, N.T.1    Bard, G.V.2    Wagner, D.3
  • 11
    • 84945116168 scopus 로고    scopus 로고
    • On Perfect and Adaptive Security in Exposure-Resilient Cryptography
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • Dodis, Y., Sahai, A., Smith, A.: On perfect and adaptive security in exposureresilient cryptography. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.2045, pp. 301-324. Springer, Heidelberg (2001) (Pubitemid 33275839)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2045 , pp. 301-324
    • Dodis, Y.1    Sahai, A.2    Smith, A.3
  • 14
    • 33749583877 scopus 로고    scopus 로고
    • On forward-secure storage extended abstract
    • In: Dwork,C. (ed.) LNCS, Springer, Heidelberg
    • Dziembowski, S.: On forward-secure storage (extended abstract). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.4117, pp. 251-270. Springer, Heidelberg (2006)
    • (2006) CRYPTO 2006 , vol.4117 , pp. 251-270
    • Dziembowski, S.1
  • 15
    • 35048832981 scopus 로고    scopus 로고
    • On generating the initial key in the boundedstorage model
    • In: Cachin, C., Camenisch, J.L. (eds.) LNCS, Springer, Heidelberg
    • Dziembowski, S., Maurer, U.M.: On generating the initial key in the boundedstorage model. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 126-137. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004 , vol.3027 , pp. 126-137
    • Dziembowski, S.1    Maurer, U.M.2
  • 16
    • 46749096773 scopus 로고    scopus 로고
    • Intrusion-resilient secret sharing
    • Dziembowski, S., Pietrzak, K.: Intrusion-resilient secret sharing. In: FOCS, pp. 227-237 (2007)
    • (2007) FOCS , pp. 227-237
    • Dziembowski, S.1    Pietrzak, K.2
  • 17
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-resilient cryptography
    • Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: FOCS (2008)
    • (2008) FOCS
    • Dziembowski, S.1    Pietrzak, K.2
  • 18
    • 51849131973 scopus 로고    scopus 로고
    • On the power of power analysis in the real world: A complete break of the keeLoq code hopping scheme
    • In: Wagner,D. (ed.) LNCS, Springer, Heidelberg
    • Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.T.M.: On the power of power analysis in the real world: A complete break of the keeLoq code hopping scheme. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.5157, pp. 203-220. Springer, Heidelberg (2008)
    • (2008) CRYPTO 2008 , vol.5157 , pp. 203-220
    • Eisenbarth, T.1    Kasper, T.2    Moradi, A.3    Paar, C.4    Salmasizadeh, M.5    Shalmani, M.T.M.6
  • 19
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic Analysis: Concrete Results
    • Cryptographic Hardware and Embedded Systems - CHES 2001
    • Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results. In: CHES, pp. 251-261 (2001) (Pubitemid 33329068)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2162 , pp. 251-261
    • Gandolfi, K.1    Mourtel, C.2    Olivier, F.3
  • 20
    • 0027306732 scopus 로고
    • A uniform-complexity treatment of encryption and zero-knowledge
    • Goldreich, O.: A uniform-complexity treatment of encryption and zero-knowledge. Journal of Cryptology 6(1), 21-53 (1993)
    • (1993) Journal of Cryptology , vol.6 , Issue.1 , pp. 21-53
    • Goldreich, O.1
  • 21
    • 0021567758 scopus 로고
    • How to construct random functions
    • Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. In: FOCS, pp. 464-479 (1984)
    • (1984) FOCS , pp. 464-479
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 22
    • 51849168583 scopus 로고    scopus 로고
    • One-time programs
    • In: Wagner,D. (ed.) LNCS, Springer, Heidelberg
    • Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: One-time programs. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.5157, pp. 39-56. Springer, Heidelberg (2008)
    • (2008) CRYPTO 2008 , vol.5157 , pp. 39-56
    • Goldwasser, S.1    Kalai, Y.T.2    Rothblum, G.N.3
  • 24
    • 40249089887 scopus 로고    scopus 로고
    • On seed-incompressible functions
    • In: Canetti,R. (ed.) LNCS, Springer, Heidelberg
    • Halevi, S., Myers, S., Rackoff, C.: On seed-incompressible functions. In: Canetti, R. (ed.) TCC 2008. LNCS, vol.4948, pp. 19-36. Springer, Heidelberg (2008)
    • (2008) TCC 2008 , vol.4948 , pp. 19-36
    • Halevi, S.1    Myers, S.2    Rackoff, C.3
  • 26
    • 84947403595 scopus 로고
    • Probability inequalities for sums of bounded random variables
    • Hoeffding, W.: Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association 58(301), 13-30 (1963)
    • (1963) Journal of the American Statistical Association , vol.58 , Issue.301 , pp. 13-30
    • Hoeffding, W.1
  • 27
    • 67650693669 scopus 로고    scopus 로고
    • A practical attack on keeLoq
    • In: Pfitzma B.(ed.) LNCS, Springer, Heidelberg
    • Indesteege, S., Keller, N., Dunkelman, O., Biham, E., Preneel, B.: A practical attack on KeeLoq. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.2045, pp. 1-18. Springer, Heidelberg (2001)
    • (2001) EUROCRYPT 2001 , vol.2045 , pp. 1-18
    • Indesteege, S.1    Keller, N.2    Dunkelman, O.3    Biham, E.4    Preneel, B.5
  • 30
    • 84958769993 scopus 로고    scopus 로고
    • Side Channel Cryptanalysis of Product Ciphers
    • Computer Security - ESORICS 98
    • Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side channel cryptanalysis of product ciphers. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.1485, pp. 97-110. Springer, Heidelberg (1998) (Pubitemid 128135767)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1485 , pp. 97-110
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3    Hall, C.4
  • 31
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Advances in Cryptology - CRYPTO '96
    • Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.1109, pp. 104-113. Springer, Heidelberg (1996) (Pubitemid 126106234)
    • (1996) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1109 , pp. 104-113
    • Kocher, P.C.1
  • 32
    • 67650658687 scopus 로고    scopus 로고
    • Design and validation strategies for obtaining assurance in countermeasures to power analysis and related attacks
    • Kocher, P.C.: Design and validation strategies for obtaining assurance in countermeasures to power analysis and related attacks. In: Proceedings of the NIST Physical Security Workshop (2005)
    • (2005) Proceedings of the NIST Physical Security Workshop
    • Kocher, P.C.1
  • 33
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • In: Wiener,M. (ed.) LNCS, Springer, Heidelberg
    • Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) CRYPTO 1999 , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 34
    • 85043762670 scopus 로고
    • A provably-secure strongly-randomized cipher
    • In: Damg̊ard,I.B. (ed.) LNCS, Springer, Heidelberg
    • Maurer, U.M.: A provably-secure strongly-randomized cipher. In: Damg̊ard, I.B. (ed.) EUROCRYPT 1990. LNCS, vol.473, pp. 361-373. Springer, Heidelberg (1991)
    • (1991) EUROCRYPT 1990 , vol.473 , pp. 361-373
    • Maurer, U.M.1
  • 36
    • 77952354675 scopus 로고    scopus 로고
    • A block cipher based pseudo random number generator secure against side-channel key recovery
    • Petit, C., Standaert, F.-X., Pereira, O., Malkin, T., Yung, M.: A block cipher based pseudo random number generator secure against side-channel key recovery. In: ASIACCS, pp. 56-65 (2008)
    • (2008) ASIACCS , pp. 56-65
    • Petit, C.1    Standaert, F.-X.2    Pereira, O.3    Malkin, T.4    Yung, M.5
  • 37
    • 67650664894 scopus 로고    scopus 로고
    • Full version of this paper
    • Pietrzak, K.: Full version of this paper, http://homepages.cwi.nl/ pietrzak/publications.html
    • Pietrzak, K.1
  • 38
    • 38049144160 scopus 로고    scopus 로고
    • Range extension for weak pRFs; the good, the bad, and the ugly
    • In: Naor, M. (ed.) LNCS, Springer, Heidelberg
    • Pietrzak, K., Sjödin, J.: Range extension for weak pRFs; the good, the bad, and the ugly. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.4515, pp. 517-533. Springer, Heidelberg (2007)
    • (2007) EUROCRYPT 2007 , vol.4515 , pp. 517-533
    • Pietrzak, K.1    Sjödin, J.2
  • 39
    • 78650238574 scopus 로고    scopus 로고
    • ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
    • Smart Card Programming and Security
    • Quisquater, J.-J., Samyde, D.: Electromagnetic analysis (ema): Measures and counter-measures for smart cards. In: E-smart, pp. 200-210 (2001) (Pubitemid 33340056)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2140 , pp. 200-210
    • Quisquater, J.-J.1    Samyde, D.2
  • 41
    • 67650694228 scopus 로고    scopus 로고
    • A unified framework for the analysis of side-channel key recovery attacks
    • In: Joux, A. (ed.) LNCS, Springer, Heidelberg
    • Standaert, F.-X., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.5479, pp. 443-461. Springer, Heidelberg (2009)
    • EUROCRYPT 2009 , vol.5479 , Issue.2009 , pp. 443-461
    • Standaert, F.-X.1    Malkin, T.2    Yung, M.3
  • 42
    • 4344628859 scopus 로고    scopus 로고
    • Constructing locally computable extractors and cryptosystems in the bounded-storage model
    • Vadhan, S.P.: Constructing locally computable extractors and cryptosystems in the bounded-storage model. Journal of Cryptology 17(1), 43-77 (2004)
    • (2004) Journal of Cryptology 17 , Issue.1 , pp. 43-77
    • Vadhan, S.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.