메뉴 건너뛰기




Volumn , Issue , 2010, Pages 177-182

Remote cache timing attack on advanced encryption standard and countermeasures

Author keywords

Advanced Encryption Standard; Cache Timing Attack; Countermeasures; Security; Side Channel Attack

Indexed keywords

ADVANCED ENCRYPTION STANDARD; CACHE TIMING ATTACK; COUNTERMEASURES; SECURITY; SIDE CHANNEL ATTACK;

EID: 79952768733     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIAFS.2010.5715656     Document Type: Conference Paper
Times cited : (25)

References (17)
  • 1
    • 0003508558 scopus 로고    scopus 로고
    • Available Accessed on 02 March 2010
    • Advanced Encryption Standard, Wikipedia, Available: http://en.wikipedia. org/wiki/Advanced-Encryption-Standard, Accessed on 02 March 2010.
    • Advanced Encryption Standard
  • 4
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Advances in Cryptology - CRYPTO '96
    • th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO 1996), p 104-113, Springer-Verlag London, UK, 1996. (Pubitemid 126106234)
    • (1996) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1109 , pp. 104-113
    • Kocher, P.C.1
  • 5
    • 85032541897 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • August
    • D. Brumley and D. Boneh. Remote Timing Attacks are Practical, in USENIX, August 2003.
    • (2003) USENIX
    • Brumley, D.1    Boneh, D.2
  • 6
    • 78650238574 scopus 로고    scopus 로고
    • ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
    • Smart Card Programming and Security
    • J.-J. Quisquater and D. Samyde. Electromagnetic Analysis (EMA): Measures and counter-measures for smart cards. In E-smart, pages 200-210, 2001. (Pubitemid 33340056)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2140 , pp. 200-210
    • Quisquater, J.-J.1    Samyde, D.2
  • 7
    • 35248892041 scopus 로고    scopus 로고
    • A simple power-analysis (SPA) attack on implementations of the AES key expansion
    • S. Mangard. A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. In ICISC 2002, volume 2587, pages 343-358.
    • ICISC 2002 , vol.2587 , pp. 343-358
    • Mangard, S.1
  • 8
    • 33745640963 scopus 로고    scopus 로고
    • Cache attacks an countermeasures: The case of AES
    • December
    • Dag Arne Osvik Adi Shamir and Eran Tromer Cache attacks an countermeasures: The Case of AES, Lecture Notes in Computer Science, Volume 3860/2006, pages 1-20 December 2005
    • (2005) Lecture Notes in Computer Science , vol.3860 , pp. 1-20
    • Osvik, D.A.1    Shamir, A.2    Tromer, E.3
  • 14
    • 84896824646 scopus 로고    scopus 로고
    • Collision attacks on processors with cache and countermeasures
    • Western European Workshop on Research in Cryptology (WEWoRC) 2005 Available
    • C. Lauradoux, Collision attacks on processors with cache and countermeasures, in Western European Workshop on Research in Cryptology (WEWoRC) 2005. Lectures Notes in Informatics, vol. P-74 (2005), pp. 76-85. Available: http://www.cosic.esat.kuleuven.ac.be/WeWorc/allAbstracts.pdf
    • (2005) Lectures Notes in Informatics , vol.P-74 , pp. 76-85
    • Lauradoux, C.1
  • 15
    • 79960321311 scopus 로고    scopus 로고
    • Trace driven cache attack on AES (short paper)
    • Proc. International Conference on Information and Communications Security (ICICS) 2006 Springer, Berlin
    • O. Aciiçmez, Ç.K. Koç, Trace driven cache attack on AES (short paper), in Proc. International Conference on Information and Communications Security (ICICS) 2006. Lecture Notes in Computer Science, vol. 4296 (Springer, Berlin, 2006), pp. 112-121
    • (2006) Lecture Notes in Computer Science , vol.4296 , pp. 112-121
    • Aciiçmez, O.1    Koç, Ç.K.2
  • 16
    • 35248855964 scopus 로고    scopus 로고
    • Cryptanalysis of DES implemented on computers with cache
    • Proc. Cryptographic Hardware and Embedded Systems (CHES) 2003 Springer, Berlin
    • Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, H. Miyauchi, Cryptanalysis of DES implemented on computers with cache, in Proc. Cryptographic Hardware and Embedded Systems (CHES) 2003. Lecture Notes in Computer Science, vol. 2779 (Springer, Berlin, 2003), pp. 62-76
    • (2003) Lecture Notes in Computer Science , vol.2779 , pp. 62-76
    • Tsunoo, Y.1    Saito, T.2    Suzaki, T.3    Shigeri, M.4    Miyauchi, H.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.