메뉴 건너뛰기




Volumn 5747 LNCS, Issue , 2009, Pages 156-170

An efficient method for random delay generation in embedded software

Author keywords

Countermeasures; Random delays; Side channel attacks

Indexed keywords

COUNTERMEASURES; EFFICIENT METHOD; FAULT ATTACK; RANDOM DELAY; RANDOM DELAYS; SIDE CHANNEL ATTACK; SIDE CHANNEL ATTACKS; SIDE-CHANNEL;

EID: 70350589242     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04138-9_12     Document Type: Conference Paper
Times cited : (114)

References (6)
  • 1
    • 85099425898 scopus 로고    scopus 로고
    • Clavier, C., Coron, J.-S., Dabbous, N.: Differential power analysis in the presence of hardware countermeasures. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, 1965, pp. 252-263. Springer, Heidelberg (2000)
    • Clavier, C., Coron, J.-S., Dabbous, N.: Differential power analysis in the presence of hardware countermeasures. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252-263. Springer, Heidelberg (2000)
  • 2
    • 35048819488 scopus 로고    scopus 로고
    • Mangard, S.: Hardware countermeasures against DPA - a statistical analysis of their effectiveness. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, 2964, pp. 222-235. Springer, Heidelberg (2004)
    • Mangard, S.: Hardware countermeasures against DPA - a statistical analysis of their effectiveness. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 222-235. Springer, Heidelberg (2004)
  • 3
    • 33845193998 scopus 로고    scopus 로고
    • Amiel, F., Clavier, C., Tunstall, M.: Fault analysis of DPA-resistant algorithms. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, 4236, pp. 223-236. Springer, Heidelberg (2006)
    • Amiel, F., Clavier, C., Tunstall, M.: Fault analysis of DPA-resistant algorithms. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 223-236. Springer, Heidelberg (2006)
  • 4
    • 37149030674 scopus 로고    scopus 로고
    • Efficient use of random delays in embedded software
    • Sauveron, D, Markantonakis, K, Bilas, A, Quisquater, J.-J, eds, WISTP 2007, Springer, Heidelberg
    • Tunstall, M., Benoit, O.: Efficient use of random delays in embedded software. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 27-38. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4462 , pp. 27-38
    • Tunstall, M.1    Benoit, O.2
  • 6
    • 70350598395 scopus 로고    scopus 로고
    • Brier, E., Clavier, C., Benoit, O.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 135-152. Springer, Heidelberg (2004)
    • Brier, E., Clavier, C., Benoit, O.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 135-152. Springer, Heidelberg (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.