메뉴 건너뛰기




Volumn 1965, Issue , 2000, Pages 238-251

Using second-order power analysis to attack DPA resistant software

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; EMBEDDED SYSTEMS; HARDWARE; SMART CARDS;

EID: 68549099555     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (301)

References (15)
  • 2
    • 84939573910 scopus 로고    scopus 로고
    • Joshua Jaffe, and Benjamin Jun, “Differential Power Analysis,” in proceedings of Advances in Cryptology-CRYPTO ‘99
    • Paul Kocher
    • Paul Kocher, Joshua Jaffe, and Benjamin Jun, “Differential Power Analysis,” in proceedings of Advances in Cryptology-CRYPTO ‘99, Springer-Verlag, 1999, pp. 388-397.
    • (1999) Springer-Verlag , pp. 388-397
  • 3
    • 84904650499 scopus 로고    scopus 로고
    • Sloan, “Investigations of Power Analysis Attacks on Smartcards,” Proceedings of USENIX Workshop on Smartcard Technology, May
    • Thomas S. Messerges, Ezzy A. Dabbish, and Robert H. Sloan, “Investigations of Power Analysis Attacks on Smartcards,” Proceedings of USENIX Workshop on Smartcard Technology, May 1999, pp. 151-161.
    • (1999) And Robert H , pp. 151-161
    • Messerges, T.S.1    Dabbish, E.A.2
  • 5
    • 84944337068 scopus 로고    scopus 로고
    • S. Chari, C. Jutla, J.R. Rao, and P. Rohatgi, “A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards,” Second Advanced Encryption Standard Candidate Conference, http://www.nist.gov/aes, March 1999
    • S. Chari, C. Jutla, J.R. Rao, and P. Rohatgi, “A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards,” Second Advanced Encryption Standard Candidate Conference, http://www.nist.gov/aes, March 1999.
  • 6
    • 84949514743 scopus 로고    scopus 로고
    • Sloan, “Power Analysis Attacks of Modular Exponentiation in Smartcards,” in proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Springer-Verlag
    • Thomas S. Messerges, Ezzy A. Dabbish, and Robert H. Sloan, “Power Analysis Attacks of Modular Exponentiation in Smartcards,” in proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Springer-Verlag, August 1999, pp. 144-157.
    • (1999) And Robert H , pp. 144-157
    • Messerges, T.S.1    Dabbish, E.A.2
  • 9
    • 23044523291 scopus 로고    scopus 로고
    • Securing the AES Finalists Against Power Analysis Attacks
    • Springer-Verlag, April
    • Thomas S. Messerges, “Securing the AES Finalists Against Power Analysis Attacks,” in proceedings of Fast Software Encryption Workshop 2000, Springer-Verlag, April 2000.
    • (2000) In Proceedings of Fast Software Encryption Workshop , vol.2000
    • Messerges, T.S.1
  • 10
    • 84957079591 scopus 로고    scopus 로고
    • Rohatgi, “Towards Sound Approaches to Counteract Power-Analysis Attacks,” in proceedings of Advances in Cryptology-CRYPTO ‘99
    • Suresh Chari, Charanjit S. Jutla, Josyula R. Rao and Pankaj J. Rohatgi, “Towards Sound Approaches to Counteract Power-Analysis Attacks,” in proceedings of Advances in Cryptology-CRYPTO ‘99, Springer-Verlag, 1999, pp. 398-412.
    • (1999) Springer-Verlag , pp. 398-412
    • Chari, S.1    Jutla, C.S.2    Rao, J.R.3    Pankaj, J.4
  • 13
    • 84944337072 scopus 로고    scopus 로고
    • Kuhn, “Self-timed Technology to Reduce Smartcard Fraud,” in proceedings of ACiD-WG Workshop, Grenoble
    • S. W. Moore, R. Anderson and M. Kuhn, “Self-timed Technology to Reduce Smartcard Fraud,” in proceedings of ACiD-WG Workshop, Grenoble, February 2000.
    • (2000) R. Anderson and M
    • Moore, S.W.1
  • 14
    • 84944337073 scopus 로고    scopus 로고
    • Applying Asynchronous Circuits in Contactless Smartcards
    • Grenoble, February
    • Joep Kessels, “Applying Asynchronous Circuits in Contactless Smartcards,” in proceedings of ACiD-WG Workshop, Grenoble, February 2000.
    • Proceedings of Acid-Wg Workshop , pp. 2000
    • Kessels, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.