메뉴 건너뛰기




Volumn 6544 LNCS, Issue , 2011, Pages 241-261

Improving DPA by peak distribution analysis

Author keywords

Differential power analysis; Euclidean similarity; ghost peaks

Indexed keywords

CRYPTOGRAPHIC DEVICES; DIFFERENTIAL POWER ANALYSIS; DISTINGUISHERS; DPA ATTACKS; ENHANCEMENT TECHNIQUES; EUCLIDEAN; GHOST PEAKS; PEAK DISTRIBUTION; POWER CONSUMPTION; SECRET KEY;

EID: 79952597725     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19574-7_17     Document Type: Conference Paper
Times cited : (25)

References (18)
  • 2
    • 35048818034 scopus 로고    scopus 로고
    • Correlation power analysis with a leakage model
    • Joye, M., Quisquater, J.-J. (eds.), Springer, Heidelberg
    • BrieríE., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
    • (2004) CHES 2004. LNCS , vol.3156 , pp. 16-29
    • Brieríe1    Clavier, C.2    Olivier, F.3
  • 3
    • 68549099548 scopus 로고    scopus 로고
    • Differential Power Analysis in the Presence of Hardware Countermeasures
    • Cryptographic Hardware and Embedded Systems - CHES 2000 Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings
    • Clavier, C., Coron, J.-S., Dabbous, N.: Differential power analysis in the presence of hardware countermeasures. In: Paar, C., Ko̧c, Ç .K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252-263. Springer, Heidelberg (2000) (Pubitemid 33213973)
    • (2000) Lecture Notes in Computer Science , Issue.1965 , pp. 252-263
    • Clavier, C.1    Coron, J.-S.2    Dabbous, N.3
  • 6
    • 0035271038 scopus 로고    scopus 로고
    • Euclidean distance as a similarity metric for principal component analysis
    • Elmore, K.L., Richman, M.B.: Euclidean distance as a similarity metric for principle component analysis. American Meteorological Society 129(3), 540-549 (2001) (Pubitemid 32418374)
    • (2001) Monthly Weather Review , vol.129 , Issue.3 , pp. 540-549
    • Elmore, K.L.1    Richman, M.B.2
  • 7
    • 51049117070 scopus 로고    scopus 로고
    • Mutual information analysis
    • Oswald, E., Rohatgi, P. (eds.), Springer, Heidelberg
    • Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual information analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426-442. Springer, Heidelberg (2008)
    • (2008) CHES 2008. LNCS , vol.5154 , pp. 426-442
    • Gierlichs, B.1    Batina, L.2    Tuyls, P.3    Preneel, B.4
  • 8
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Advances in Cryptology - CRYPTO '96
    • Kocher, P.C.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996) (Pubitemid 126106234)
    • (1996) Lecture Notes in Computer Science , Issue.1109 , pp. 104-113
    • Kocher, P.C.1
  • 9
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Wiener, M. (ed.), Springer, Heidelberg
    • Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) CRYPTO 1999. LNCS , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 10
    • 35048819488 scopus 로고    scopus 로고
    • Hardware countermeasures against dpa - A statistical analysis of their effectiveness
    • Okamoto, T. (ed.), Springer, Heidelberg
    • Mangard, S.: Hardware countermeasures against dpa - a statistical analysis of their effectiveness. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 222-235. Springer, Heidelberg (2004)
    • (2004) CT-RSA 2004. LNCS , vol.2964 , pp. 222-235
    • Mangard, S.1
  • 11
    • 84890863577 scopus 로고    scopus 로고
    • Power analysis attacks: Revealing the secrets of smart cards
    • Springer, Heidelberg
    • Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. In: Advances in Information Security. Springer, Heidelberg (2007)
    • (2007) Advances in Information Security
    • Mangard, S.1    Oswald, E.2    Popp, T.3
  • 12
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • DOI 10.1109/TC.2002.1004593
    • Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Computers 51(5), 541-552 (2002) (Pubitemid 34550462)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 14
    • 48249139801 scopus 로고    scopus 로고
    • An operation-based metric on cpa resistance
    • Jajodia, S., Samarati, P., Cimato, S. (eds.), Springer, Boston
    • Pan, J., den Hartog, J.I., de Vink, E.P.: An operation-based metric on cpa resistance. In: Jajodia, S., Samarati, P., Cimato, S. (eds.) SEC, International Federation for Information Processing, pp. 429-443. Springer, Boston (2008)
    • (2008) SEC, International Federation for Information Processing , pp. 429-443
    • Pan, J.1    Den Hartog, J.I.2    De Vink, E.P.3
  • 15
    • 78650238574 scopus 로고    scopus 로고
    • ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
    • Smart Card Programming and Security
    • Quisquater, J.-J., Samyde, D.: Electromagnetic analysis (ema): Measures and counter-measures for smart cards. In: Attali, I., Jensen, T.P. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200-210. Springer, Heidelberg (2001) (Pubitemid 33340056)
    • (2001) Lecture Notes in Computer Science , Issue.2140 , pp. 200-210
    • Quisquater, J.-J.1    Samyde, D.2
  • 16
    • 67049146380 scopus 로고    scopus 로고
    • Partition vs. comparison sidechannel distinguishers: An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected cmos devices
    • Lee, P.J., Cheon, J.H. (eds.), Springer, Heidelberg
    • Standaert, F.-X., Gierlichs, B., Verbauwhede, I.: Partition vs. comparison sidechannel distinguishers: An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected cmos devices. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 253-267. Springer, Heidelberg (2009)
    • (2009) ICISC 2008. LNCS , vol.5461 , pp. 253-267
    • Standaert, F.-X.1    Gierlichs, B.2    Verbauwhede, I.3
  • 17
    • 67650694228 scopus 로고    scopus 로고
    • A unified framework for the analysis of side-channel key recovery attacks
    • Joux, A. (ed.), Springer, Heidelberg
    • Standaert, F.-X., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443-461. Springer, Heidelberg (2009)
    • (2009) EUROCRYPT 2009. LNCS , vol.5479 , pp. 443-461
    • Standaert, F.-X.1    Malkin, T.2    Yung, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.