메뉴 건너뛰기




Volumn 5536 LNCS, Issue , 2009, Pages 485-498

How to compare profiled side-channel attacks?

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC DEVICES; KEY RECOVERY; LEAKAGE MODEL; SECURITY METRICES; SIDE CHANNEL ATTACK; TEMPLATE ATTACKS; TWO PHASIS;

EID: 68849120642     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01957-9_30     Document Type: Conference Paper
Times cited : (54)

References (9)
  • 1
    • 35248899532 scopus 로고    scopus 로고
    • Chari, S., Rao, J., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, 2523, pp. 13-28. Springer, Heidelberg (2003)
    • Chari, S., Rao, J., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13-28. Springer, Heidelberg (2003)
  • 2
    • 33750689121 scopus 로고    scopus 로고
    • Gierlichs, B., Lemke, K., Paar, C.: Templates vs. Stochastic Methods. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 15-29. Springer, Heidelberg (2006)
    • Gierlichs, B., Lemke, K., Paar, C.: Templates vs. Stochastic Methods. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 15-29. Springer, Heidelberg (2006)
  • 3
    • 38049029221 scopus 로고    scopus 로고
    • Analyzing Side-Channel Leakage of Masked Implementations with Stochastic Methods
    • Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
    • Lemke, K., Paar, C.: Analyzing Side-Channel Leakage of Masked Implementations with Stochastic Methods. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 454-468. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4734 , pp. 454-468
    • Lemke, K.1    Paar, C.2
  • 5
    • 27244432445 scopus 로고    scopus 로고
    • Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, 3659, pp. 30-46. Springer, Heidelberg (2005)
    • Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30-46. Springer, Heidelberg (2005)
  • 6
    • 68849086923 scopus 로고    scopus 로고
    • Advanced Stochastic Methods in Side-Channel Analysis on Block Ciphers in the Presence of Masking
    • Schindler, W.: Advanced Stochastic Methods in Side-Channel Analysis on Block Ciphers in the Presence of Masking. J. of Math. Cryptology 2, 291-310 (2008)
    • (2008) J. of Math. Cryptology , vol.2 , pp. 291-310
    • Schindler, W.1
  • 7
    • 68849098213 scopus 로고    scopus 로고
    • Standaert, F.-X., Malkin, T.G., Yung, M.: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. To appear in the proceedings of Eurocrypt (2009); Extended version available from: Cryptology ePrint Archive, Report 2006/139
    • Standaert, F.-X., Malkin, T.G., Yung, M.: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. To appear in the proceedings of Eurocrypt (2009); Extended version available from: Cryptology ePrint Archive, Report 2006/139
  • 8
    • 33750693916 scopus 로고    scopus 로고
    • Standaert, F.-X., Peeters, E., Archambeau, C., Quisquater, J.-J.: Towards Security Limits in Side-Channel Attacks. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 30-45. Springer, Heidelberg (2006), http://eprint.iacr.org/2007/222
    • Standaert, F.-X., Peeters, E., Archambeau, C., Quisquater, J.-J.: Towards Security Limits in Side-Channel Attacks. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 30-45. Springer, Heidelberg (2006), http://eprint.iacr.org/2007/222
  • 9
    • 51049103841 scopus 로고    scopus 로고
    • Standaert, F.-X., Archambeau, C.: Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, 5154, pp. 411-425. Springer, Heidelberg (2008)
    • Standaert, F.-X., Archambeau, C.: Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 411-425. Springer, Heidelberg (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.