메뉴 건너뛰기




Volumn 6061 LNCS, Issue , 2010, Pages 108-125

Practical power analysis attacks on software implementations of McEliece

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC ALGORITHMS; LINEAR BINARY CODE; MCELIECE; MCELIECE PUBLIC-KEY CRYPTOSYSTEM; NP COMPLETE PROBLEMS; PHYSICAL ATTACKS; POWER ANALYSIS ATTACK; SIDE CHANNEL ATTACK; SOFTWARE IMPLEMENTATION; STORAGE SPACES;

EID: 77954406793     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-12929-2_9     Document Type: Conference Paper
Times cited : (30)

References (34)
  • 2
    • 56749164782 scopus 로고    scopus 로고
    • Attacking and Defending theMcEliece Cryptosystem
    • Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
    • Bernstein, D.J., Lange, T., Peters, C.: Attacking and Defending theMcEliece Cryptosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008), http://eprint.iacr.org/2008/ 318
    • (2008) LNCS , vol.5299 , pp. 31-46
    • Bernstein, D.J.1    Lange, T.2    Peters, C.3
  • 3
    • 56749156338 scopus 로고    scopus 로고
    • McEliece Cryptosystem Implementation: Theory and Practice
    • Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
    • Biswas, B., Sendrier, N.: McEliece Cryptosystem Implementation: Theory and Practice. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 47-62. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5299 , pp. 47-62
    • Biswas, B.1    Sendrier, N.2
  • 4
    • 58549114936 scopus 로고    scopus 로고
    • Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
    • Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. Springer, Heidelberg
    • Bogdanov, A., Kizhvatov, I., Pyshkin, A.: Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 251-265. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5365 , pp. 251-265
    • Bogdanov, A.1    Kizhvatov, I.2    Pyshkin, A.3
  • 5
    • 35048818034 scopus 로고    scopus 로고
    • Correlation Power Analysis with a Leakage Model
    • Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
    • Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3156 , pp. 16-29
    • Brier, E.1    Clavier, C.2    Olivier, F.3
  • 7
    • 35248838910 scopus 로고    scopus 로고
    • A DPA Attack against the Modular Reduction within a CRT Implementation of RSA
    • Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
    • den Boer, B., Lemke, K., Wicke, G.: A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 228-243. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2523 , pp. 228-243
    • Den Boer, B.1    Lemke, K.2    Wicke, G.3
  • 8
    • 70350591229 scopus 로고    scopus 로고
    • MicroEliece: McEliece for Embedded Devices
    • Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
    • Eisenbarth, T., Güneysu, T., Heyse, S., Paar, C.: MicroEliece: McEliece for Embedded Devices. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 49-64. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5747 , pp. 49-64
    • Eisenbarth, T.1    Güneysu, T.2    Heyse, S.3    Paar, C.4
  • 9
    • 51849131973 scopus 로고    scopus 로고
    • On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.T.M.: On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 203-220. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 203-220
    • Eisenbarth, T.1    Kasper, T.2    Moradi, A.3    Paar, C.4    Salmasizadeh, M.5    Shalmani, M.T.M.6
  • 10
    • 84858691417 scopus 로고    scopus 로고
    • A Summary of McEliece-Type Cryptosystems and their Security
    • Engelbert, D., Overbeck, R., Schmidt, A.: A Summary of McEliece-Type Cryptosystems and their Security. Journal of Mathematical Cryptology 1(2), 151-199 (2006), http://eprint.iacr.org/2006/162
    • (2006) Journal of Mathematical Cryptology , vol.1 , Issue.2 , pp. 151-199
    • Engelbert, D.1    Overbeck, R.2    Schmidt, A.3
  • 11
    • 51049117070 scopus 로고    scopus 로고
    • Mutual Information Analysis
    • Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
    • Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual Information Analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426-442. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5154 , pp. 426-442
    • Gierlichs, B.1    Batina, L.2    Tuyls, P.3    Preneel, B.4
  • 14
    • 70350678744 scopus 로고    scopus 로고
    • Breaking KeeLoq in a Flash
    • Preneel, B. (ed.) AFRICACRYPT 2009. Springer, Heidelberg
    • Kasper, M., Kasper, T., Moradi, A., Paar, C.: Breaking KeeLoq in a Flash. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 403-420. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5580 , pp. 403-420
    • Kasper, M.1    Kasper, T.2    Moradi, A.3    Paar, C.4
  • 15
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 16
    • 85034651324 scopus 로고
    • An Observation on the Security of McEliece's Public-Key Cryptosystem
    • Günther, C.G. (ed.) EUROCRYPT 1988. Springer, Heidelberg
    • Lee, P.J., Brickell, E.F.: An Observation on the Security of McEliece's Public-Key Cryptosystem. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 275-280. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.330 , pp. 275-280
    • Lee, P.J.1    Brickell, E.F.2
  • 17
    • 0024078914 scopus 로고
    • A Probabilistic Algorithm for Computing Minimum Weights of Large Error-Correcting Codes
    • Leon, J.S.: A Probabilistic Algorithm for Computing Minimum Weights of Large Error-Correcting Codes. IEEE Transactions on Information Theory 34(5), 1354-1359 (1988)
    • (1988) IEEE Transactions on Information Theory , vol.34 , Issue.5 , pp. 1354-1359
    • Leon, J.S.1
  • 18
    • 0002448405 scopus 로고
    • A Public-Key Cryptosystem Based on Algebraic Coding Theory
    • McEliece, R.J.: A Public-Key Cryptosystem Based On Algebraic Coding Theory. Deep Space Network Progress Report 44, 114-116 (1978)
    • (1978) Deep Space Network Progress Report , vol.44 , pp. 114-116
    • McEliece, R.J.1
  • 19
    • 68549099555 scopus 로고    scopus 로고
    • Using Second-Order Power Analysis to Attack DPA Resistant Software
    • Paar, C., Koç, Ç.K. (eds.) CHES 2000. Springer, Heidelberg
    • Messerges, T.S.: Using Second-Order Power Analysis to Attack DPA Resistant Software. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 238-251. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1965 , pp. 238-251
    • Messerges, T.S.1
  • 20
    • 35248821853 scopus 로고    scopus 로고
    • Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems
    • Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
    • Oswald, E.: Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 82-97. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2523 , pp. 82-97
    • Oswald, E.1
  • 21
    • 33745679179 scopus 로고    scopus 로고
    • Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers
    • Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
    • Oswald, E., Mangard, S., Herbst, C., Tillich, S.: Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 192-207. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3860 , pp. 192-207
    • Oswald, E.1    Mangard, S.2    Herbst, C.3    Tillich, S.4
  • 23
    • 70350576829 scopus 로고    scopus 로고
    • Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
    • Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
    • Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N.: Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 97-111. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5747 , pp. 97-111
    • Renauld, M.1    Standaert, F.-X.2    Veyrat-Charvillon, N.3
  • 24
    • 35048895383 scopus 로고    scopus 로고
    • A Collision-Attack on AES: Combining Side Channel- and Differential-Attack
    • Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
    • Schramm, K., Leander, G., Felke, P., Paar, C.: A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 163-175. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3156 , pp. 163-175
    • Schramm, K.1    Leander, G.2    Felke, P.3    Paar, C.4
  • 25
    • 33745652931 scopus 로고    scopus 로고
    • Higher Order Masking of the AES
    • Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
    • Schramm, K., Paar, C.: Higher Order Masking of the AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 208-225. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3860 , pp. 208-225
    • Schramm, K.1    Paar, C.2
  • 26
    • 0242571732 scopus 로고    scopus 로고
    • A New Class of Collision Attacks and Its Application to des
    • Johansson, T. (ed.) FSE 2003. Springer, Heidelberg
    • Schramm, K., Wollinger, T.J., Paar, C.: A New Class of Collision Attacks and Its Application to DES. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 206-222. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2887 , pp. 206-222
    • Schramm, K.1    Wollinger, T.J.2    Paar, C.3
  • 27
    • 77954391699 scopus 로고    scopus 로고
    • A Timing Attack Against Patterson Algorithm in the McEliece PKC
    • International Conference on Information Security and Cryptology - ICISC 2009. Springer, Heidelberg to appear
    • Shoufan, A., Strenzke, F., Molter, H.G., Stoettinger, M.: A Timing Attack Against Patterson Algorithm in the McEliece PKC. In: International Conference on Information Security and Cryptology - ICISC 2009. LNCS, Springer, Heidelberg (2009) (to appear)
    • (2009) LNCS
    • Shoufan, A.1    Strenzke, F.2    Molter, H.G.3    Stoettinger, M.4
  • 29
    • 85021424387 scopus 로고    scopus 로고
    • Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls
    • Abe, M. (ed.) CT-RSA 2007. Springer, Heidelberg
    • Silverman, J.H., Whyte, W.: Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 208-224. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4377 , pp. 208-224
    • Silverman, J.H.1    Whyte, W.2
  • 30
    • 31344451762 scopus 로고    scopus 로고
    • Power Analysis Attacks Against FPGA Implementations of the des
    • Becker, J., Platzner, M., Vernalde, S. (eds.) FPL 2004. Springer, Heidelberg
    • Standaert, F.-X., Örs, S.B., Quisquater, J.-J., Preneel, B.: Power Analysis Attacks Against FPGA Implementations of the DES. In: Becker, J., Platzner, M., Vernalde, S. (eds.) FPL 2004. LNCS, vol. 3203, pp. 84-94. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3203 , pp. 84-94
    • Standaert, F.-X.1    Örs, S.B.2    Quisquater, J.-J.3    Preneel, B.4
  • 31
    • 84964937021 scopus 로고
    • A Method for Finding Codewords of Small Weight
    • Wolfmann, J., Cohen, G. (eds.) Coding Theory 1988. Springer, Heidelberg
    • Stern, J.: A Method for Finding Codewords of Small Weight. In: Wolfmann, J., Cohen, G. (eds.) Coding Theory 1988. LNCS, vol. 388, pp. 106-113. Springer, Heidelberg (1989)
    • (1989) LNCS , vol.388 , pp. 106-113
    • Stern, J.1
  • 32
    • 56749169082 scopus 로고    scopus 로고
    • Side Channels in the McEliece PKC
    • Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
    • Strenzke, F., Tews, E., Molter, H.G., Overbeck, R., Shoufan, A.: Side Channels in the McEliece PKC. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 216-229. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5299 , pp. 216-229
    • Strenzke, F.1    Tews, E.2    Molter, H.G.3    Overbeck, R.4    Shoufan, A.5
  • 34
    • 77954405821 scopus 로고    scopus 로고
    • Bachelor's thesis, Technical University of Darmstadt, Germany
    • Vizev, N.V.: Side Channel Attacks on NTRUEncrypt. Bachelor's thesis, Technical University of Darmstadt, Germany (2007), http://www.cdc.informatik.tu- darmstadt.de/reports/reports/Nikolay-Vizev.bachelor.pdf
    • (2007) Side Channel Attacks on NTRUEncrypt
    • Vizev, N.V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.