메뉴 건너뛰기




Volumn , Issue , 2007, Pages 286-296

An information-theoretic model for adaptive side-channel attacks

Author keywords

[No Author keywords available]

Indexed keywords

APPROXIMATION TECHNIQUES; CRYPTOGRAPHIC FUNCTIONS; HARDWARE IMPLEMENTATIONS; INFORMATION-THEORETIC METRICS; POWER ATTACKS; SIDE CHANNEL ATTACK; SIDE-CHANNEL; THEORETIC MODEL;

EID: 67650696756     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1315245.1315282     Document Type: Conference Paper
Times cited : (311)

References (40)
  • 1
    • 0033702592 scopus 로고    scopus 로고
    • Transforming out timing leaks
    • ACM
    • J. Agat. Transforming out Timing Leaks. In Proc. POPL '00, pages 40-53. ACM.
    • Proc. POPL '00 , pp. 40-53
    • Agat, J.1
  • 2
    • 33646392466 scopus 로고    scopus 로고
    • Preventing timing leaks through transactional branching instructions
    • ENTCS, Elsevier
    • G. Barthe, T. Rezk, and M. Warnier. Preventing Timing Leaks Through Transactional Branching Instructions. In Proc. QAPL '05, ENTCS, pages 33-55. Elsevier.
    • Proc. QAPL '05 , pp. 33-55
    • Barthe, G.1    Rezk, T.2    Warnier, M.3
  • 3
    • 0001388569 scopus 로고
    • On a statistical estimate for the entropy of a sequence of independent random variables
    • G. Basharin. On a Statistical Estimate for the Entropy of a Sequence of Independent Random Variables. Theory Probab. Appl., 47:333-336, 1959.
    • (1959) Theory Probab. Appl. , vol.47 , pp. 333-336
    • Basharin, G.1
  • 8
    • 35248843124 scopus 로고    scopus 로고
    • A new type of timing attack: Application to GPS
    • LNCS 2779, Springer
    • J. Cathalo, F. Koeune, and J.-J. Quisquater. A New Type of Timing Attack: Application to GPS. In Proc. CARDIS '03, LNCS 2779, pages 291-303. Springer.
    • Proc. CARDIS '03 , pp. 291-303
    • Cathalo, J.1    Koeune, F.2    Quisquater, J.-J.3
  • 9
    • 84957079591 scopus 로고    scopus 로고
    • Towards sound approaches to counteract power-analysis attacks
    • LNCS 1666, Springer
    • S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi. Towards Sound Approaches to Counteract Power-Analysis Attacks. In Proc. CRYPTO '99, LNCS 1666, pages 398-412. Springer.
    • Proc. CRYPTO '99 , pp. 398-412
    • Chari, S.1    Jutla, C.S.2    Rao, J.R.3    Rohatgi, P.4
  • 11
    • 20844445346 scopus 로고    scopus 로고
    • Quantitative information flow, relations and polymorphic types
    • D. Clark, S. Hunt, and P. Malacaria. Quantitative Information Flow, Relations and Polymorphic Types. J. Log. Comput., 18 (2):181-199, 2005.
    • (2005) J. Log. Comput. , vol.18 , Issue.2 , pp. 181-199
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 15
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic analysis: Concrete results
    • LNCS 2162, Springer
    • K. Gandolfi, C. Mourtel, and F. Olivier. Electromagnetic analysis: Concrete results. In Proc. CHES '01, LNCS 2162, pages 251-261. Springer.
    • Proc. CHES '01 , pp. 251-261
    • Gandolfi, K.1    Mourtel, C.2    Olivier, F.3
  • 16
    • 84974759639 scopus 로고
    • Toward a mathematical foundation for information flow security
    • J. W. Gray. Toward a Mathematical Foundation for Information Flow Security. JCS, 1 (3-4): 255-294, 1992.
    • (1992) JCS , vol.1 , Issue.3-4 , pp. 255-294
    • Gray, J.W.1
  • 17
    • 77952376941 scopus 로고    scopus 로고
    • Timing aware information flow security for a javacard-like bytecode
    • ENTCS. Elsevier
    • D. Hedin and D. Sands. Timing Aware Information Flow Security for a JavaCard-like Bytecode. In BYTECODE '05, ENTCS. Elsevier.
    • BYTECODE '05
    • Hedin, D.1    Sands, D.2
  • 18
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • LNCS 1109, Springer
    • P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Proc. CRYPTO '96, LNCS 1109, pages 104-113. Springer.
    • Proc. CRYPTO '96 , pp. 104-113
    • Kocher, P.1
  • 19
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • LNCS 1666, Springer
    • P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In Proc. CRYPTO '99, LNCS 1666, pages 388-397. Springer.
    • Proc. CRYPTO '99 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 20
    • 33750279149 scopus 로고    scopus 로고
    • Timing-sensitive information flow analysis for synchronous systems
    • LNCS 4189, Springer
    • B. Köpf and D. Basin. Timing-Sensitive Information Flow Analysis for Synchronous Systems. In Proc. ESORICS '06, LNCS 4189, pages 243-262. Springer.
    • Proc. ESORICS '06 , pp. 243-262
    • Köpf, B.1    Basin, D.2
  • 21
    • 84948775168 scopus 로고    scopus 로고
    • Quantifying information flow
    • IEEE
    • G. Lowe. Quantifying Information Flow. In Proc. CSFW '02, pages 18-31. IEEE.
    • Proc. CSFW '02 , pp. 18-31
    • Lowe, G.1
  • 24
    • 84949514743 scopus 로고    scopus 로고
    • Power analysis attacks of modular exponentiation in smartcards
    • LNCS 1717, Springer
    • T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Power Analysis Attacks of Modular Exponentiation in Smartcards. In Proc. CHES '99, LNCS 1717, pages 144-157. Springer.
    • Proc. CHES '99 , pp. 144-157
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 25
    • 35048852134 scopus 로고    scopus 로고
    • Physically observable cryptography (extended abstract)
    • LNCS 2951, Springer
    • S. Micali and L. Reyzin. Physically Observable Cryptography (Extended Abstract). In Proc. TCC '04, LNCS 2951, pages 278-296. Springer.
    • Proc. TCC '04 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 27
    • 0028711580 scopus 로고
    • A survey of power estimation techniques in VLSI circuits
    • F. N. Najm. A Survey of Power Estimation Techniques in VLSI Circuits. IEEE Transactions on VLSI Systems, 2 (4):446-455, 1994.
    • (1994) IEEE Transactions on VLSI Systems , vol.2 , Issue.4 , pp. 446-455
    • Najm, F.N.1
  • 28
    • 33745640963 scopus 로고    scopus 로고
    • Cache attacks and countermeasures: The case of aes
    • LNCS 3860, Springer
    • D. A. Osvik, A. Shamir, and E. Tromer. Cache Attacks and Countermeasures: the Case of AES. In Proc. CT-RSA '06, LNCS 3860, pages 1-20. Springer.
    • Proc. CT-RSA '06 , pp. 1-20
    • Osvik, D.A.1    Shamir, A.2    Tromer, E.3
  • 30
    • 84947756322 scopus 로고    scopus 로고
    • On the incomparability of entropy and marginal guesswork in brute-force attacks
    • LNCS 1977, Springer
    • J. O. Pliam. On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks. In Proc. INDOCRYPT '00, LNCS 1977, pages 67-79. Springer.
    • Proc. INDOCRYPT '00 , pp. 67-79
    • Pliam, J.O.1
  • 31
    • 78650238574 scopus 로고    scopus 로고
    • Electromagnetic analysis (EMA): Measures and couter-measures for smard cards
    • LNCS 2140, Springer
    • J.-J. Quisquater and D. Samyde. ElectroMagnetic Analysis (EMA): Measures and Couter-Measures for Smard Cards. In Proc. E-smart '01, LNCS 2140, pages 200-210. Springer.
    • Proc. E-smart '01 , pp. 200-210
    • Quisquater, J.-J.1    Samyde, D.2
  • 32
    • 0033700286 scopus 로고    scopus 로고
    • Probabilistic noninterference for multi-threaded programs
    • IEEE
    • A. Sabelfeld and D. Sands. Probabilistic Noninterference for Multi-threaded Programs. In Proc. CSFW '00, pages 200-215. IEEE.
    • Proc. CSFW '00 , pp. 200-215
    • Sabelfeld, A.1    Sands, D.2
  • 34
    • 27244432445 scopus 로고    scopus 로고
    • A stochastic model for differential side-channel cryptanalysis
    • LNCS 3659, Springer
    • W. Schindler, K. Lemke, and C. Paar. A Stochastic Model for Differential Side-Channel Cryptanalysis. In Proc. CHES '05, LNCS 3659, pages 30-46. Springer.
    • Proc. CHES '05 , pp. 30-46
    • Schindler, W.1    Lemke, K.2    Paar, C.3
  • 35
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • 623-656, July and October
    • C. Shannon. A Mathematical Theory of Communication. Bell System Technical Journal, 27:379-423 and 623-656, July and October 1948.
    • (1948) Bell System Technical Journal , vol.27 , pp. 379-423
    • Shannon, C.1
  • 36
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • ACM
    • G. Smith and D. Volpano. Secure Information Flow in a Multi-Threaded Imperative Language. In Proc. POPL '98, pages 355-364. ACM.
    • Proc. POPL '98 , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 40
    • 16244410461 scopus 로고    scopus 로고
    • Power estimation techniques for cycle-accurate functional descriptions of hardware
    • ACM
    • L. Zhong, S. Ravi, A. Raghunathan, and N. Jha. Power Estimation Techniques for Cycle-Accurate Functional Descriptions of Hardware. In Proc. ICCAD '04, pages 668-675. ACM.
    • Proc. ICCAD '04 , pp. 668-675
    • Zhong, L.1    Ravi, S.2    Raghunathan, A.3    Jha, N.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.