메뉴 건너뛰기




Volumn 5747 LNCS, Issue , 2009, Pages 97-111

Algebraic side-channel attacks on the AES: Why time also matters in DPA

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRAIC STRUCTURES; ALGEBRAIC TECHNIQUES; BLOCK CIPHERS; CODE SIZE; GATE COUNT; MASKING SCHEMES; MASTER KEY; PHYSICAL INFORMATION; PHYSICAL SECURITY; PLAINTEXT; RIJNDAEL; SIDE CHANNEL ATTACK; SYSTEM OF EQUATIONS;

EID: 70350576829     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04138-9_8     Document Type: Conference Paper
Times cited : (109)

References (25)
  • 1
    • 38149142875 scopus 로고    scopus 로고
    • Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers, Cryptology ePrint Archive
    • Report 2007/024
    • Bard, G., Courtois, N., Jefferson, C.: Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers, Cryptology ePrint Archive, Report 2007/024
    • Bard, G.1    Courtois, N.2    Jefferson, C.3
  • 2
    • 0242404236 scopus 로고    scopus 로고
    • Biryukov, A., De Cannière, C.: Block Ciphers and Systems of Quadratic Equations. In: Johansson, T. (ed.) FSE 2003. LNCS, 2887, pp. 274-289. Springer, Heidelberg (2003)
    • Biryukov, A., De Cannière, C.: Block Ciphers and Systems of Quadratic Equations. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 274-289. Springer, Heidelberg (2003)
  • 3
    • 38049070243 scopus 로고    scopus 로고
    • Biryukov, A., Khovratovich, D.: Two New Techniques of Side-Channel Cryptanalysis. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, 4727, pp. 195-208. Springer, Heidelberg (2007)
    • Biryukov, A., Khovratovich, D.: Two New Techniques of Side-Channel Cryptanalysis. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 195-208. Springer, Heidelberg (2007)
  • 4
    • 38549140491 scopus 로고    scopus 로고
    • Bogdanov, A.: Improved Side-Channel Collision Attacks on AES. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, 4876, pp. 84-95. Springer, Heidelberg (2007)
    • Bogdanov, A.: Improved Side-Channel Collision Attacks on AES. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 84-95. Springer, Heidelberg (2007)
  • 5
    • 58549114936 scopus 로고    scopus 로고
    • Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
    • Chowdhury, D.R, Rijmen, V, Das, A, eds, INDOCRYPT 2008, Springer, Heidelberg
    • Bogdanov, A., Kizhvatov, I., Pyshkin, A.: Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 251-265. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5365 , pp. 251-265
    • Bogdanov, A.1    Kizhvatov, I.2    Pyshkin, A.3
  • 6
    • 33745654751 scopus 로고    scopus 로고
    • Buchmann, J., Pyshkin, A., Weinmann, R.-P.: Block Ciphers Sensitive to Gröbner Basis Attacks. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, 3860, pp. 313-331. Springer, Heidelberg (2006)
    • Buchmann, J., Pyshkin, A., Weinmann, R.-P.: Block Ciphers Sensitive to Gröbner Basis Attacks. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 313-331. Springer, Heidelberg (2006)
  • 7
    • 33746903957 scopus 로고    scopus 로고
    • Generalizing Square Attack using Side-Channels of an AES Implementation on an FPGA
    • Tampere, Finland, August, 2005
    • Carlier, V., Chabanne, H., Dottax, E., Pelletier, H.: Generalizing Square Attack using Side-Channels of an AES Implementation on an FPGA. In: The proceedings of FPL 2005, Tampere, Finland, August 2005, pp. 433-437 (2005)
    • (2005) The proceedings of FPL , pp. 433-437
    • Carlier, V.1    Chabanne, H.2    Dottax, E.3    Pelletier, H.4
  • 8
    • 70350587605 scopus 로고    scopus 로고
    • http://www.princeton.edu/~chaff/
  • 9
    • 35248899532 scopus 로고    scopus 로고
    • Chari, S., Rao, J., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, 2523, pp. 13-28. Springer, Heidelberg (2003)
    • Chari, S., Rao, J., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13-28. Springer, Heidelberg (2003)
  • 10
    • 84958765510 scopus 로고    scopus 로고
    • Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
    • Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
    • Courtois, N., Pieprzyk, J.: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267-287. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2501 , pp. 267-287
    • Courtois, N.1    Pieprzyk, J.2
  • 11
    • 38149068190 scopus 로고    scopus 로고
    • Algebraic Cryptanalysis of the Data Encryption Standard
    • Galbraith, S.D, ed, Cryptography and Coding 2007, Springer, Heidelberg
    • Courtois, N., Bard, G.: Algebraic Cryptanalysis of the Data Encryption Standard. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol. 4887, pp. 274-289. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4887 , pp. 274-289
    • Courtois, N.1    Bard, G.2
  • 12
    • 70350615150 scopus 로고    scopus 로고
    • Faugère, J.-C.: Groebner Bases. In: Applications in Cryptology, FSE 2007, Invited Talk (2007), http://fse2007.uni.lu/slides/faugere.pdf
    • Faugère, J.-C.: Groebner Bases. In: Applications in Cryptology, FSE 2007, Invited Talk (2007), http://fse2007.uni.lu/slides/faugere.pdf
  • 13
    • 70350585636 scopus 로고    scopus 로고
    • FIPS 197, Advanced Encryption Standard, Federal Information Processing Standard, NIST, U.S. Dept. of Commerce, November 26 (2001)
    • FIPS 197, "Advanced Encryption Standard," Federal Information Processing Standard, NIST, U.S. Dept. of Commerce, November 26 (2001)
  • 15
    • 38149026169 scopus 로고    scopus 로고
    • Handschuh, H., Preneel, B.: Blind Differential Cryptanalysis for Enhanced Power Attacks. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, 4356, pp. 163-173. Springer, Heidelberg (2007)
    • Handschuh, H., Preneel, B.: Blind Differential Cryptanalysis for Enhanced Power Attacks. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 163-173. Springer, Heidelberg (2007)
  • 16
    • 33746589805 scopus 로고    scopus 로고
    • Herbst, C., Oswald, E., Mangard, S.: An AES Smart Card Implementation Resistant to Power Analysis Attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, 3989, pp. 239-252. Springer, Heidelberg (2006)
    • Herbst, C., Oswald, E., Mangard, S.: An AES Smart Card Implementation Resistant to Power Analysis Attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 239-252. Springer, Heidelberg (2006)
  • 17
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
    • Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398-412. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 398-412
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 18
    • 35048824462 scopus 로고    scopus 로고
    • Ledig, H., Muller, F., Valette, F.: Enhancing Collision Attacks. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 176-190. Springer, Heidelberg (2004)
    • Ledig, H., Muller, F., Valette, F.: Enhancing Collision Attacks. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 176-190. Springer, Heidelberg (2004)
  • 19
    • 35248892041 scopus 로고    scopus 로고
    • A Simple Power-Analysis (SPA) Attackon Implementations of the AES Key Expansion
    • Lee, P.J, Lim, C.H, eds, ICISC 2002, Springer, Heidelberg
    • Mangard, S.: A Simple Power-Analysis (SPA) Attackon Implementations of the AES Key Expansion. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 343-358. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2587 , pp. 343-358
    • Mangard, S.1
  • 20
    • 33744946821 scopus 로고    scopus 로고
    • Oswald, E., Schramm, K.: An Efficient Masking Scheme for AES Software Implementations. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, 3786, pp. 292-305. Springer, Heidelberg (2006)
    • Oswald, E., Schramm, K.: An Efficient Masking Scheme for AES Software Implementations. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 292-305. Springer, Heidelberg (2006)
  • 21
    • 77952354675 scopus 로고    scopus 로고
    • A Block Cipher based PRNG Secure Against Side-Channel Key Recovery
    • Tokyo, Japan, March, 2008
    • Petit, C., Standaert, F.-X., Pereira, O., Malkin, T.G., Yung, M.: A Block Cipher based PRNG Secure Against Side-Channel Key Recovery. In: The proceedings of ASIACCS 2008, Tokyo, Japan, March 2008, pp. 56-65 (2008)
    • (2008) The proceedings of ASIACCS , pp. 56-65
    • Petit, C.1    Standaert, F.-X.2    Pereira, O.3    Malkin, T.G.4    Yung, M.5
  • 22
    • 67650675583 scopus 로고    scopus 로고
    • Pietrzak, K.: A Leakage-Resilient Mode of Operation. In: Joux, A. (ed.) Eurocrypt 2009. LNCS, 5479, pp. 462-482. Springer, Heidelberg (2009)
    • Pietrzak, K.: A Leakage-Resilient Mode of Operation. In: Joux, A. (ed.) Eurocrypt 2009. LNCS, vol. 5479, pp. 462-482. Springer, Heidelberg (2009)
  • 24
    • 0242571732 scopus 로고    scopus 로고
    • Schramm, K., Wollinger, T.J., Paar, C.: A New Class of Collision Attacks and Its Application to DES. In: Johansson, T. (ed.) FSE 2003. LNCS, 2887, pp. 206-222. Springer, Heidelberg (2003)
    • Schramm, K., Wollinger, T.J., Paar, C.: A New Class of Collision Attacks and Its Application to DES. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 206-222. Springer, Heidelberg (2003)
  • 25
    • 35048895383 scopus 로고    scopus 로고
    • Schramm, K., Leander, G., Felke, P., Paar, C.: A Collision-Attack on AES: Combining Side Channel and Differential Attack. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 163-175. Springer, Heidelberg (2004)
    • Schramm, K., Leander, G., Felke, P., Paar, C.: A Collision-Attack on AES: Combining Side Channel and Differential Attack. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 163-175. Springer, Heidelberg (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.