메뉴 건너뛰기




Volumn 5479 LNCS, Issue , 2009, Pages 443-461

A unified framework for the analysis of side-channel key recovery attacks

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC APPROACH; APPLICATION METHODOLOGY; CRYPTOGRAPHIC IMPLEMENTATION; FURTHER DEVELOPMENT; KEY RECOVERY ATTACKS; SECURITY METRICS; SIDE CHANNEL ATTACK; SIDE-CHANNEL; THEORETICAL MODELS; THEORETICAL POINTS; UNIFIED FRAMEWORK; UNIFIED METHODOLOGY;

EID: 67650694228     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01001-9_26     Document Type: Conference Paper
Times cited : (688)

References (33)
  • 2
    • 35248817849 scopus 로고    scopus 로고
    • The EM side-channel(s)
    • Kaliski Jr.B.S.Koçc ÇK.Paar C. (eds.) LNCS Springer, Heidelberg
    • Agrawal, D., Archambeault, B., Rao, J., Rohatgi, P.: The EM side-channel(s). In: Kaliski Jr., B.S., Ko̧c, Ç .K., Paar, C. (eds.) CHES 2002. LNCS, vol.2523, pp. 29-45. Springer, Heidelberg (2003)
    • (2003) CHES 2002 , vol.2523 , pp. 29-45
    • Agrawal, D.1    Archambeault, B.2    Rao, J.3    Rohatgi, P.4
  • 3
    • 57049173071 scopus 로고    scopus 로고
    • Formally bounding the side-channel leakage in unknown-message attacks
    • Backes, M., Köpf, B.: Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks, IACR ePrint archive (2008), http://eprint.iacr.org/ 2008/162
    • (2008) IACR ePrint archive
    • Backes, M.1    Köpf, B.2
  • 5
    • 35048848967 scopus 로고    scopus 로고
    • In: Franklin, M. (ed.) LNCS Springer, Heidelberg
    • Biryukov, A., De Cannière, C., Quisquater, M.: On multiple linear approximations. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.3152, pp. 1-22. Springer, Heidelberg (2004)
    • (2004) CRYPTO 2004 , vol.3152 , pp. 1-22
    • Biryukov, A.1    De Cannière, C.2    Quisquater, M.3
  • 7
    • 35248899532 scopus 로고    scopus 로고
    • Template attacks
    • In: Kaliski Jr., B.S., Ko̧c, Ç .K., Paar, C. (eds.) LNCS Springer, Heidelberg
    • Chari, S., Rao, J., Rohatgi, P.: Template attacks. In: Kaliski Jr., B.S., Ko̧c, Ç .K., Paar, C. (eds.) CHES 2002. LNCS, vol.2523, pp. 13-28. Springer, Heidelberg (2003)
    • (2003) CHES 2002 , vol.2523 , pp. 13-28
    • Chari, S.1    Rao, J.2    Rohatgi, P.3
  • 9
    • 84869534347 scopus 로고    scopus 로고
    • Application of attack potential to smart cards
    • July
    • Application of Attack Potential to Smart Cards, Common Criteria Supporting Document, Version 1.1 (July 2002), http://www.commoncriteriaportal. org
    • (2002) Common Criteria Supporting Document, Version 1.1
  • 11
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-resilient cryptography
    • Philadelphia, USA, October
    • Dziembowski, S., Pietrzak, K.: Leakage-Resilient Cryptography. In: The proceedings of FOCS 2008, Philadelphia, USA, pp. 293-302 (October 2008)
    • (2008) The Proceedings of FOCS , pp. 293-302
    • Dziembowski, S.1    Pietrzak, K.2
  • 12
    • 84869542189 scopus 로고    scopus 로고
    • ECRYPT network of excellence in cryptology
    • ECRYPT Network of Excellence in Cryptology, The Side-Channel Cryptanalysis Lounge, http://www.crypto.ruhr-uni-bochum.de/en-sclounge.html
    • The Side-Channel Cryptanalysis Lounge
  • 14
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic Analysis: Concrete Results
    • Cryptographic Hardware and Embedded Systems - CHES 2001
    • Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results. In: Ko̧c, Ç .K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.2162, pp. 251-261. Springer, Heidelberg (2001) (Pubitemid 33329068)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2162 , pp. 251-261
    • Gandolfi, K.1    Mourtel, C.2    Olivier, F.3
  • 15
    • 35048896529 scopus 로고    scopus 로고
    • Algorithmic tamper-proof security: Theoretical foundations for security against tampering
    • In: Naor, M. (ed.) LNCS,Springer, Heidelberg
    • Gennaro, R., Lysyanskaya, A., Malkin, T.G., Micali, S., Rabin, T.: Algorithmic Tamper-Proof Security: Theoretical Foundations for Security Against Tampering. In: Naor, M. (ed.) TCC 2004. LNCS, vol.2951, pp. 258-277. Springer, Heidelberg (2004)
    • (2004) TCC 2004 , vol.2951 , pp. 258-277
    • Gennaro, R.1    Lysyanskaya, A.2    Malkin, T.G.3    Micali, S.4    Rabin, T.5
  • 16
    • 33750689121 scopus 로고    scopus 로고
    • Templates vs. stochastic methods
    • In: Goubin, L., Matsui, M. (eds.) LNCS, Springer, Heidelberg
    • Gierlichs, B., Lemke-Rust, K., Paar, C.: Templates vs. Stochastic methods. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.4249, pp. 15-29. Springer, Heidelberg (2006)
    • (2006) CHES 2006 , vol.4249 , pp. 15-29
    • Gierlichs, B.1    Lemke-Rust, K.2    Paar, C.3
  • 19
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • In: Wiener, M. (ed.) LNCS, Springer, Heidelberg
    • Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.1666, pp. 398-412. Springer, Heidelberg (1999)
    • (1999) CRYPTO 1999 , vol.1666 , pp. 398-412
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 20
    • 67650696756 scopus 로고    scopus 로고
    • An Information theoretic model for adaptive side-channel attacks
    • Alexandria, VA, USA October
    • Köpf, B., Basin, D.: an Information Theoretic Model for Adaptive Side-Channel Attacks. In: The proceedings of ACMCCS 2007, Alexandria, VA, USA (October 2007)
    • (2007) The Proceedings of ACMCCS
    • Köpf, B.1    Basin, D.2
  • 21
    • 38049074795 scopus 로고    scopus 로고
    • Information theoretic evaluation of side-channel resistant logic styles
    • In: Paillier, P., Verbauwhede, I. (eds.) LNCS, Springer, Heidelberg
    • Maće, F., Standaert, F.-X., Quisquater, J.-J.: Information theoretic evaluation of side-channel resistant logic styles. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.4727, pp. 427-442. Springer, Heidelberg (2007)
    • (2007) CHES 2007 , vol.4727 , pp. 427-442
    • Maće, F.1    Standaert, F.-X.2    Quisquater, J.-J.3
  • 24
    • 35048852134 scopus 로고    scopus 로고
    • Physically Observable Cryptography
    • Theory of Cryptography First Theory of Cryptography Conference, TCC 2004 Cambridge, MA, USA, February 19-21, 2004 Proceedings
    • Micali, S., Reyzin, L.: Physically observable cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, vol.2951, pp. 278-296. Springer, Heidelberg (2004) (Pubitemid 38236631)
    • (2004) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2951 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 25
    • 77952354675 scopus 로고    scopus 로고
    • A block cipher based PRNG secure against side-channel key recovery
    • Tokyo, Japan, March 2008
    • Petit, C., Standaert, F.-X., Pereira, O., Malkin, T.G., Yung, M.: A Block Cipher based PRNG Secure Against Side-Channel Key Recovery. In: ASIACCS 2008, Tokyo, Japan, pp. 56-65 (March 2008)
    • ASIACCS 2008 , pp. 56-65
    • Petit, C.1    Standaert, F.-X.2    Pereira, O.3    Malkin, T.G.4    Yung, M.5
  • 26
    • 67650649354 scopus 로고    scopus 로고
    • A leakage-resilient mode of operation
    • Cologne, Germany. LNCS April 2009 to appear
    • Pietrzak, K.: A Leakage-Resilient Mode of Operation. In: The proceedings of Eurocrypt 2009, Cologne, Germany. LNCS (April 2009) (to appear)
    • (2009) The Proceedings of Eurocrypt
    • Pietrzak, K.1
  • 27
    • 27244432445 scopus 로고    scopus 로고
    • A stochastic model for differential side channel cryptanalysis
    • Cryptographic Hardware and Embedded Systems - CHES 2005: 7th International Workshop. Proceedings
    • Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.3659, pp. 30- 46. Springer, Heidelberg (2005) (Pubitemid 41520697)
    • (2005) Lecture Notes in Computer Science , vol.3659 , pp. 30-46
    • Schindler, W.1    Lemke, K.2    Paar, C.3
  • 28
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • Shannon, C.E.: A Mathematical Theory of Communication. Bell System Technical Journal 27, 379-423, 623-656 (1948)
    • (1948) Bell System Technical Journal , vol.27 , Issue.379-423 , pp. 623-656
    • Shannon, C.E.1
  • 29
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon, C.E.: Communication theory of secrecy systems. Bell System Technical Journal 28, 656-715 (1949)
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 31
    • 33750693916 scopus 로고    scopus 로고
    • Towards security limits in side-channel attacks
    • In: Goubin, L., Matsui, M. (eds.) LNCS, Springer, Heidelberg
    • Standaert, F.-X., Peeters, E., Archambeau, C., Quisquater, J.-J.: Towards security limits in side-channel attacks. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.4249, pp. 30-45. Springer, Heidelberg (2006)
    • (2006) CHES 2006 , vol.4249 , pp. 30-45
    • Standaert, F.-X.1    Peeters, E.2    Archambeau, C.3    Quisquater, J.-J.4
  • 32
    • 51049103841 scopus 로고    scopus 로고
    • Using subspace-based template attacks to compare and combine power and electromagnetic information leakages
    • In: Oswald, E., Rohatgi, P. (eds.) LNCS, Springer, Heidelberg
    • Standaert, F.-X., Archambeau, C.: Using subspace-based template attacks to compare and combine power and electromagnetic information leakages. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.5154, pp. 411-425. Springer, Heidelberg (2008)
    • (2008) CHES 2008 , vol.5154 , pp. 411-425
    • Standaert, F.-X.1    Archambeau, C.2
  • 33
    • 67049146380 scopus 로고    scopus 로고
    • Partition vs. comparison side- channel distinguishers: An empirical evaluation of statistical tests for univariate side-channel attacks
    • In: Lee, P.J., Cheon, J.H. (eds.) LNCS, Springer, Heidelberg
    • Standaert, F.-X., Gierlichs, B., Verbauwhede, I.: Partition vs. Comparison Side- Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol.5461, pp. 253-267. Springer, Heidelberg (2009)
    • (2008) ICISC 2008 , vol.5461 , Issue.2009 , pp. 253-267
    • Standaert, F.-X.1    Gierlichs, B.2    Verbauwhede, I.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.