메뉴 건너뛰기




Volumn , Issue , 2008, Pages 56-65

A block cipher based pseudo random number generator secure against side-channel key recovery

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMIC DESIGN; BAYESIAN; BLACK BOXES; BLOCK CIPHERS; CRYPTOGRAPHIC SCHEMES; EXPONENTIAL FACTORS; IDEAL-CIPHER MODEL; KEY RECOVERY; KEY SIZES; PHYSICAL WORLD; POLYNOMIAL FACTOR; PSEUDO RANDOM NUMBER GENERATORS; SECURITY PARAMETERS; SIDE CHANNEL ATTACK; SIDE-CHANNEL;

EID: 77952354675     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1368310.1368322     Document Type: Conference Paper
Times cited : (54)

References (19)
  • 1
    • 84937436045 scopus 로고    scopus 로고
    • Increasing the lifetime of a key: A comparative analysis of the security of re-keying techniques
    • Kyoto, Japan, December
    • M. Abdalla, M. Bellare, Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-Keying Techniques, in the proceedings of Asiacrypt 2000, Lecture Notes in Computer Science, vol 1976, pp 546-559, Kyoto, Japan, December 2000.
    • (2000) The Proceedings of Asiacrypt 2000, Lecture Notes in Computer Science , vol.1976 , pp. 546-559
    • Abdalla, M.1    Bellare, M.2
  • 2
    • 85032128552 scopus 로고    scopus 로고
    • The security of the CBC message authentication code
    • num
    • M. Bellare, J. Kilian, P. Rogaway, The Security of the CBC Message Authentication Code, Journal of Computer Systems, vol 61, num 3, pp 362-399, 2000.
    • (2000) Journal of Computer Systems , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 3
    • 35248860702 scopus 로고    scopus 로고
    • A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications
    • Warsaw, Poland, May
    • M. Bellare, T. Kohno, A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and applications, in the proceedings of Eurocrypt 2003, Lecture Notes in Computer Science, vol 5656, pp 491-506, Warsaw, Poland, May 2003.
    • (2003) The Proceedings of Eurocrypt 2003, Lecture Notes in Computer Science , vol.5656 , pp. 491-506
    • Bellare, M.1    Kohno, T.2
  • 4
    • 50449107349 scopus 로고    scopus 로고
    • Black-box analysis of the block-cipher-based hash-function constructions from PGV
    • Santa Barbare, USA, August
    • J. Black, P. Rogaway, T. Shrimpton, Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV, in the proceedings of Crypto 2002, Lecture Notes in Computer Science, vol 2442, pp 320-335, Santa Barbare, USA, August 2002.
    • (2002) The Proceedings of Crypto 2002, Lecture Notes in Computer Science , vol.2442 , pp. 320-335
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 6
    • 0003508558 scopus 로고    scopus 로고
    • Advanced encryption standard
    • FIPS 197, U. S. Dept. of Commerce, November 26
    • FIPS 197, "Advanced Encryption Standard, " Federal Information Processing Standard, NIST, U. S. Dept. of Commerce, November 26, 2001.
    • (2001) Federal Information Processing Standard, NIST
  • 10
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • num
    • M. Luby, C. Rackoff, How to Construct Pseudorandom Permutations from Pseudorandom Functions, SIAM Journal of Computing, vol 17, num 2, pp 373-386, 1988.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 11
    • 67650658687 scopus 로고    scopus 로고
    • Design and validation strategies for obtaining assurance in countermeasures to power analysis and related attacks
    • Honolulu, Hawai, September
    • P. Kocher, Design and Validation Strategies for Obtaining Assurance in Countermeasures to Power Analysis and Related Attacks, in the proceedings of the NIST Physical Security Workshop, Honolulu, Hawai, September 2005.
    • (2005) The Proceedings of the NIST Physical Security Workshop
    • Kocher, P.1
  • 13
    • 35048819488 scopus 로고    scopus 로고
    • Hardware countermeasures against DPA - A statistical analysis of their effectiveness
    • San Francisco, CA, USA, February
    • S. Mangard, Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness, in the proceedings of CT-RSA 2004, Lecture Notes in Computer Science, vol 2964, pp 222-235, San Francisco, CA, USA, February 2004.
    • (2004) The Proceedings of CT-RSA 2004, Lecture Notes in Computer Science , vol.2964 , pp. 222-235
    • Mangard, S.1
  • 14
    • 35048852134 scopus 로고    scopus 로고
    • Physically observable cryptography
    • Cambridge, Massachusetts, USA, February
    • S. Micali, L. Reyzin, Physically Observable Cryptography, in the proceedings of TCC 2004, LNCS, vol 2951, pp. 278-296, Cambridge, Massachusetts, USA, February 2004.
    • (2004) The Proceedings of TCC 2004, LNCS , vol.2951 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 15
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • num
    • C. E. Shannon, Communication theory of secrecy systems, in Bell Systems Technical Journal, vol 28, num 4, pp 656-715, 1949.
    • (1949) Bell Systems Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 19
    • 0020301290 scopus 로고
    • Theory and applications of trapdoor functions (extended abstract)
    • A. C. Yao, Theory and Applications of Trapdoor Functions (Extended Abstract), in the proceedings of FOCS 1982, pp. 80-91.
    • (1982) The Proceedings of FOCS , pp. 80-91
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.