메뉴 건너뛰기




Volumn 6225 LNCS, Issue , 2010, Pages 428-442

Algebraic side-channel analysis in the presence of errors

Author keywords

Algebraic attacks; Power analysis; Pseudo Boolean optimization; Side channel attacks

Indexed keywords

ALGEBRA; EMBEDDED SYSTEMS; ERROR ANALYSIS; FORMAL LOGIC; MEASUREMENT ERRORS; TRACE ANALYSIS;

EID: 78049331666     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15031-9_29     Document Type: Conference Paper
Times cited : (41)

References (21)
  • 4
    • 70350650936 scopus 로고    scopus 로고
    • Nonlinear pseudo-boolean optimization: Relaxation or propagation?
    • Kullmann, O. ed, Springer, Heidelberg
    • Berthold, T., Heinz, S., Pfetsch, M. E.: Nonlinear pseudo-boolean optimization: Relaxation or propagation? In: Kullmann, O. (ed.) SAT 2009. LNCS, vol. 5584, pp. 441-446. Springer, Heidelberg (2009)
    • (2009) SAT 2009. LNCS , vol.5584 , pp. 441-446
    • Berthold, T.1    Heinz, S.2    Pfetsch, M.E.3
  • 6
    • 27244440344 scopus 로고    scopus 로고
    • A very compact S-box for AES
    • Rao, J. R., Sunar, B. eds., Springer, Heidelberg
    • Canright, D.: A very compact S-Box for AES. In: Rao, J. R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 441-455. Springer, Heidelberg (2005)
    • (2005) CHES 2005. LNCS , vol.3659 , pp. 441-455
    • Canright, D.1
  • 7
    • 50249137714 scopus 로고    scopus 로고
    • Algebraic and slide attacks on KeeLoq
    • Nyberg, K. ed, Springer, Heidelberg
    • Courtois, N., Bard, G. V., Wagner, D.: Algebraic and slide attacks on KeeLoq. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 97-115. Springer, Heidelberg (2008)
    • (2008) FSE 2008. LNCS , vol.5086 , pp. 97-115
    • Courtois, N.1    Bard, G.V.2    Wagner, D.3
  • 10
    • 51849131973 scopus 로고    scopus 로고
    • On the power of power analysis in the real world: A complete break of the Keeloq code hopping scheme
    • Wagner, D. ed, Springer, Heidelberg
    • Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Manzuri Shalmani, M. T.: On the power of power analysis in the real world: A complete break of the Keeloq code hopping scheme. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 203-220. Springer, Heidelberg (2008)
    • (2008) CRYPTO 2008. LNCS , vol.5157 , pp. 203-220
    • Eisenbarth, T.1    Kasper, T.2    Moradi, A.3    Paar, C.4    Salmasizadeh, M.5    Shalmani, M.M.T.6
  • 11
    • 35248868313 scopus 로고    scopus 로고
    • Hidden Markov model cryptoanalysis
    • Walter, C. D., Koç, Ç. K., Paar, C. eds., Springer, Heidelberg
    • Karlof, C., Wagner, D.: Hidden Markov model cryptoanalysis. In: Walter, C. D., Koç, Ç. K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 17-34. Springer, Heidelberg (2003)
    • (2003) CHES 2003. LNCS , vol.2779 , pp. 17-34
    • Karlof, C.1    Wagner, D.2
  • 12
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Wiener, M. ed, Springer, Heidelberg
    • Kocher, P. C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) CRYPTO 1999. LNCS , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 13
    • 35248892041 scopus 로고    scopus 로고
    • A simple power-analysis (SPA) attack on implementations of the AES key expansion
    • Lee, P. J., Lim, C. H. eds., Springer, Heidelberg
    • Mangard, S.: A simple power-analysis (SPA) attack on implementations of the AES key expansion. In: Lee, P. J., Lim, C. H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 343-358. Springer, Heidelberg (2003)
    • (2003) ICISC 2002. LNCS , vol.2587 , pp. 343-358
    • Mangard, S.1
  • 16
    • 0034140491 scopus 로고    scopus 로고
    • Logical cryptanalysis as a SAT problem
    • Massacci, F., Marraro, L.: Logical cryptanalysis as a SAT problem. J. Autom. Reason. 24 (1-2), 165-203 (2000)
    • (2000) J. Autom. Reason , vol.24 , Issue.1-2 , pp. 165-203
    • Massacci, F.1    Marraro, L.2
  • 17
    • 34247563970 scopus 로고    scopus 로고
    • Aiding sidechannel attacks on cryptographic software with satisfiability-based analysis
    • Potlapally, N. R., Raghunathan, A., Ravi, S., Jha, N. K., Lee, R. B.: Aiding sidechannel attacks on cryptographic software with satisfiability-based analysis. IEEE Trans. on VLSI Systems 15(4), 465-470 (2007)
    • (2007) IEEE Trans. on VLSI Systems , vol.15 , Issue.4 , pp. 465-470
    • Potlapally, N.R.1    Raghunathan, A.2    Ravi, S.3    Jha, N.K.4    Lee, R.B.5
  • 18
    • 70350576829 scopus 로고    scopus 로고
    • Algebraic side-channel attacks on the AES: Why time also matters in DPA
    • Clavier, C., Gaj, K. eds., Springer, Heidelberg
    • Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N.: Algebraic side-channel attacks on the AES: Why time also matters in DPA. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 97-111. Springer, Heidelberg (2009)
    • (2009) CHES 2009. LNCS , vol.5747 , pp. 97-111
    • Renauld, M.1    Standaert, F.-X.2    Veyrat-Charvillon, N.3
  • 20
    • 84935113569 scopus 로고
    • Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
    • Viterbi, A.: Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Transactions on Information Theory 13(2), 260-269 (1967)
    • (1967) IEEE Transactions on Information Theory , vol.13 , Issue.2 , pp. 260-269
    • Viterbi, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.