메뉴 건너뛰기




Volumn 5747 LNCS, Issue , 2009, Pages 171-188

Higher-order masking and shuffling for software implementations of block ciphers

Author keywords

[No Author keywords available]

Indexed keywords

BLOCK CIPHERS; DIFFERENTIAL POWER ANALYSIS; DPA ATTACKS; HIGHER ORDER; KEY RECOVERY ATTACKS; RESISTANCE LEVEL; SECURITY LEVEL; SECURITY PARAMETERS; SIDE-CHANNEL; SOFTWARE IMPLEMENTATION;

EID: 70350578892     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04138-9_13     Document Type: Conference Paper
Times cited : (102)

References (27)
  • 1
    • 84943615552 scopus 로고    scopus 로고
    • Akkar, M.-L., Giraud, C.: An Implementation of DES and AES, Secure against Some Attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 309-318. Springer, Heidelberg (2001)
    • Akkar, M.-L., Giraud, C.: An Implementation of DES and AES, Secure against Some Attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 309-318. Springer, Heidelberg (2001)
  • 2
    • 84957079591 scopus 로고    scopus 로고
    • Towards Sound Approaches to Counteract Power-Analysis Attacks
    • Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
    • Chari, S., Jutla, C., Rao, J., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398-412. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 398-412
    • Chari, S.1    Jutla, C.2    Rao, J.3    Rohatgi, P.4
  • 3
    • 85099425898 scopus 로고    scopus 로고
    • Clavier, C., Coron, J.-S., Dabbous, N.: Differential Power Analysis in the Presence of Hardware Countermeasures. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, 1965, pp. 252-263. Springer, Heidelberg (2000)
    • Clavier, C., Coron, J.-S., Dabbous, N.: Differential Power Analysis in the Presence of Hardware Countermeasures. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252-263. Springer, Heidelberg (2000)
  • 4
    • 52149083271 scopus 로고    scopus 로고
    • Coron, J.-S.: A New DPA Countermeasure Based on Permutation Tables. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, 5229, pp. 278-292. Springer, Heidelberg (2008)
    • Coron, J.-S.: A New DPA Countermeasure Based on Permutation Tables. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 278-292. Springer, Heidelberg (2008)
  • 5
    • 38049064396 scopus 로고    scopus 로고
    • Coron, J.-S., Prouff, E., Rivain, M.: Side Channel Cryptanalysis of a Higher Order Masking Scheme. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, 4727, pp. 28-44. Springer, Heidelberg (2007)
    • Coron, J.-S., Prouff, E., Rivain, M.: Side Channel Cryptanalysis of a Higher Order Masking Scheme. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 28-44. Springer, Heidelberg (2007)
  • 6
    • 70350603411 scopus 로고    scopus 로고
    • FIPS PUB 197. Advanced Encryption Standard. National Institute of Standards and Technology (November 2001)
    • FIPS PUB 197. Advanced Encryption Standard. National Institute of Standards and Technology (November 2001)
  • 7
    • 84949520149 scopus 로고    scopus 로고
    • Goubin, L., Patarin, J.: DES and Differential Power Analysis - The Duplication Method. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 158-172. Springer, Heidelberg (1999)
    • Goubin, L., Patarin, J.: DES and Differential Power Analysis - The Duplication Method. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 158-172. Springer, Heidelberg (1999)
  • 8
    • 33746589805 scopus 로고    scopus 로고
    • Herbst, P., Oswald, E., Mangard, S.: An AES Smart Card Implementation Resistant to Power Analysis Attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, 3989, pp. 239-252. Springer, Heidelberg (2006)
    • Herbst, P., Oswald, E., Mangard, S.: An AES Smart Card Implementation Resistant to Power Analysis Attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 239-252. Springer, Heidelberg (2006)
  • 9
    • 27244453895 scopus 로고    scopus 로고
    • Joye, M., Paillier, P., Schoenmakers, B.: On Second-order Differential Power Analysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, 3659, pp. 293-308. Springer, Heidelberg (2005)
    • Joye, M., Paillier, P., Schoenmakers, B.: On Second-order Differential Power Analysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 293-308. Springer, Heidelberg (2005)
  • 11
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
    • Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 12
    • 35048819488 scopus 로고    scopus 로고
    • Mangard, S.: Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, 2964, pp. 222-235. Springer, Heidelberg (2004)
    • Mangard, S.: Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 222-235. Springer, Heidelberg (2004)
  • 14
    • 84974679353 scopus 로고    scopus 로고
    • Messerges, T.: Securing the AES Finalists against Power Analysis Attacks. In: Schneier, B. (ed.) FSE 2000. LNCS, 1978, pp. 150-164. Springer, Heidelberg (2001)
    • Messerges, T.: Securing the AES Finalists against Power Analysis Attacks. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 150-164. Springer, Heidelberg (2001)
  • 15
    • 85099425965 scopus 로고    scopus 로고
    • Messerges, T.: Using Second-order Power Analysis to Attack DPA Resistant Software. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, 1965, pp. 238-251. Springer, Heidelberg (2000)
    • Messerges, T.: Using Second-order Power Analysis to Attack DPA Resistant Software. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 238-251. Springer, Heidelberg (2000)
  • 16
    • 84979240258 scopus 로고    scopus 로고
    • Oswald, E., Mangard, S.: Template Attacks on Masking - Resistance is Futile. In: Abe, M. (ed.) CT-RSA 2007. LNCS, 4377, pp. 243-256. Springer, Heidelberg (2006)
    • Oswald, E., Mangard, S.: Template Attacks on Masking - Resistance is Futile. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 243-256. Springer, Heidelberg (2006)
  • 17
    • 33745679179 scopus 로고    scopus 로고
    • Oswald, E., Mangard, S., Herbst, C., Tillich, S.: Practical Second-order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, 3860, pp. 192-207. Springer, Heidelberg (2006)
    • Oswald, E., Mangard, S., Herbst, C., Tillich, S.: Practical Second-order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 192-207. Springer, Heidelberg (2006)
  • 18
    • 85034496745 scopus 로고
    • How to Construct Pseudorandom and Super Pseudorandom Permutation from one Single Pseudorandom Function
    • Rueppel, R.A, ed, EUROCRYPT 1992, Springer, Heidelberg
    • Patarin, J.: How to Construct Pseudorandom and Super Pseudorandom Permutation from one Single Pseudorandom Function. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 256-266. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.658 , pp. 256-266
    • Patarin, J.1
  • 19
    • 85028843848 scopus 로고
    • How to Construct Pseudorandom Permutations from Single Pseudorandom Functions Advances
    • Damgård, I.B, ed, EUROCRYPT 1990, Springer, Heidelberg
    • Pieprzyk, J.: How to Construct Pseudorandom Permutations from Single Pseudorandom Functions Advances. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 140-150. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.473 , pp. 140-150
    • Pieprzyk, J.1
  • 20
    • 66049085129 scopus 로고    scopus 로고
    • Statistical Analysis of Second Order Differential Power Analysis
    • Prouff, E., Rivain, M., Bévan, R.: Statistical Analysis of Second Order Differential Power Analysis. IEEE Trans. Comput. 58(6), 799-811 (2009)
    • (2009) IEEE Trans. Comput , vol.58 , Issue.6 , pp. 799-811
    • Prouff, E.1    Rivain, M.2    Bévan, R.3
  • 21
    • 50249140648 scopus 로고    scopus 로고
    • Rivain, M., Dottax, E., Prouff, E.: Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. In: Nyberg, K. (ed.) FSE 2008. LNCS, 5086, pp. 127-143. Springer, Heidelberg (2008)
    • Rivain, M., Dottax, E., Prouff, E.: Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 127-143. Springer, Heidelberg (2008)
  • 22
    • 70350597152 scopus 로고    scopus 로고
    • Higher-order Masking and Shuffling for Software Implementations of Block Ciphers
    • Rivain, M., Prouff, E., Doget, J.: Higher-order Masking and Shuffling for Software Implementations of Block Ciphers. Cryptology ePrint Archive (2009), http://eprint.iacr.org/
    • (2009) Cryptology ePrint Archive
    • Rivain, M.1    Prouff, E.2    Doget, J.3
  • 23
    • 33745652931 scopus 로고    scopus 로고
    • Schramm, K., Paar, C.: Higher Order Masking of the AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, 3860, pp. 208-225. Springer, Heidelberg (2006)
    • Schramm, K., Paar, C.: Higher Order Masking of the AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 208-225. Springer, Heidelberg (2006)
  • 24
    • 31344461368 scopus 로고    scopus 로고
    • An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays
    • Standaert, F.-X., Peeters, E., Rouvroy, G., Quisquater, J.-J.: An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays. IEEE 94(2), 383-394 (2006)
    • (2006) IEEE , vol.94 , Issue.2 , pp. 383-394
    • Standaert, F.-X.1    Peeters, E.2    Rouvroy, G.3    Quisquater, J.-J.4
  • 25
    • 51049110311 scopus 로고    scopus 로고
    • Tillich, S., Herbst, C.: Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, 5154, pp. 228-243. Springer, Heidelberg (2008)
    • Tillich, S., Herbst, C.: Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 228-243. Springer, Heidelberg (2008)
  • 26
    • 38049073937 scopus 로고    scopus 로고
    • Tillich, S., Herbst, C., Mangard, S.: Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, 4521, pp. 141-157. Springer, Heidelberg (2007)
    • Tillich, S., Herbst, C., Mangard, S.: Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 141-157. Springer, Heidelberg (2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.