메뉴 건너뛰기




Volumn 6280 LNCS, Issue , 2010, Pages 106-120

Algorithmic tamper-proof security under probing attacks

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC DEVICES; CRYPTOGRAPHIC HARDWARE; HARDWARE DEVICES; MEMORY LOCATIONS; OPEN PROBLEMS; PERSONAL IDENTIFICATION NUMBER; TAMPER PROOF;

EID: 77958074345     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15317-4_8     Document Type: Conference Paper
Times cited : (10)

References (14)
  • 1
    • 35248817849 scopus 로고    scopus 로고
    • The em side-channel(s)
    • Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) Springer, Heidelberg
    • Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM side-channel(s). In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29-45. Springer, Heidelberg (2003)
    • (2003) CHES 2002. LNCS , vol.2523 , pp. 29-45
    • Agrawal, D.1    Archambeault, B.2    Rao, J.R.3    Rohatgi, P.4
  • 2
    • 0002380073 scopus 로고    scopus 로고
    • Proceedings of the Second Usenix Workshop on Electronic Commerce November
    • Anderson, R., Kuhn, M.: Tamper Resistance-a Cautionary Note. In: Proceedings of the Second Usenix Workshop on Electronic Commerce, pp. 1-11 (November 1996)
    • (1996) Tamper Resistance-a Cautionary Note , pp. 1-11
    • Anderson, R.1    Kuhn, M.2
  • 3
    • 0000694402 scopus 로고    scopus 로고
    • Low cost attacks on tamper resistant devices
    • Lomas, M. (ed.) Springer, Heidelberg
    • Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189. Springer, Heidelberg (1997)
    • (1997) Security Protocols 1996. LNCS , vol.1189
    • Anderson, R.1    Kuhn, M.2
  • 5
    • 84958641478 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • Kaliski Jr., B.S. (ed.) Springer, Heidelberg
    • Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513-525. Springer, Heidelberg (1997)
    • (1997) CRYPTO 1997. LNCS , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 6
    • 35248899532 scopus 로고    scopus 로고
    • Template attacks
    • Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) Springer, Heidelberg
    • Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13-28. Springer, Heidelberg (2003)
    • (2003) CHES 2002. LNCS , vol.2523 , pp. 13-28
    • Chari, S.1    Rao, J.R.2    Rohatgi, P.3
  • 8
    • 35048896529 scopus 로고    scopus 로고
    • Algorithmic tamper-proof (atp) security: Theoretical foundations for security against hardware tampering
    • Naor, M. (ed.) Springer, Heidelberg
    • Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic tamper-proof (atp) security: Theoretical foundations for security against hardware tampering. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 258-277. Springer, Heidelberg (2004)
    • (2004) TCC 2004. LNCS , vol.2951 , pp. 258-277
    • Gennaro, R.1    Lysyanskaya, A.2    Malkin, T.3    Micali, S.4    Rabin, T.5
  • 9
    • 33746066725 scopus 로고    scopus 로고
    • Private circuits ii: Keeping secrets in tamperable circuits
    • Vaudenay, S. (ed.) Springer, Heidelberg
    • Ishai, Y., Prabhakaran, M., Sahai, A., Wagner, D.: Private circuits ii: Keeping secrets in tamperable circuits. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 308-327. Springer, Heidelberg (2006)
    • (2006) EUROCRYPT 2006. LNCS , vol.4004 , pp. 308-327
    • Ishai, Y.1    Prabhakaran, M.2    Sahai, A.3    Wagner, D.4
  • 10
    • 35248830337 scopus 로고    scopus 로고
    • Private circuits: Securing hardware against probing attacks
    • Boneh, D. (ed.) Springer, Heidelberg
    • Ishai, Y., Sahai, A., Wagner, D.: Private circuits: Securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463-481. Springer, Heidelberg (2003)
    • (2003) CRYPTO 2003. LNCS , vol.2729 , pp. 463-481
    • Ishai, Y.1    Sahai, A.2    Wagner, D.3
  • 11
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Wiener, M. J. (ed.) Springer, Heidelberg
    • Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) CRYPTO 1999. LNCS , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 12
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Koblitz, N. (ed.) Springer, Heidelberg
    • Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
    • (1996) CRYPTO 1996. LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 13
    • 35048852134 scopus 로고    scopus 로고
    • Physically observable cryptography
    • Naor, M. (ed.) Springer, Heidelberg
    • Micali, S., Reyzin, L.: Physically observable cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278-296. Springer, Heidelberg (2004)
    • (2004) TCC 2004. LNCS , vol.2951 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 14
    • 35248813476 scopus 로고    scopus 로고
    • Optical fault induction attacks
    • Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) Springer, Heidelberg
    • Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 2-12. Springer, Heidelberg (2003)
    • (2003) CHES 2002. LNCS , vol.2523 , pp. 2-12
    • Skorobogatov, S.P.1    Anderson, R.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.