메뉴 건너뛰기




Volumn 6633 LNCS, Issue , 2011, Pages 100-115

Formal framework for the evaluation of waveform resynchronization algorithms

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONALLY EFFICIENT; FORMAL FRAMEWORK; IN-PHASE; INDIRECT EFFECTS; MASKING COUNTERMEASURE; PHASE-ONLY CORRELATION; POC ALGORITHMS; PRE-TREATMENT; RESYNCHRONIZATION; SIDE CHANNEL ATTACK; SIDE-CHANNEL ANALYSIS; WAVE FORMS; WAVEFORM SIMILARITY;

EID: 79958785692     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-21040-2_7     Document Type: Conference Paper
Times cited : (13)

References (22)
  • 1
    • 35048818034 scopus 로고    scopus 로고
    • Correlation Power Analysis with a Leakage Model
    • Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
    • Brier, É., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3156 , pp. 16-29
    • Brier, É.1    Clavier, C.2    Olivier, F.3
  • 2
    • 68549099548 scopus 로고    scopus 로고
    • Differential power analysis in the presence of hardware countermeasures
    • Paar, C., Koç, Ç.K. (eds.) CHES 2000. Springer, Heidelberg
    • Clavier, C., Coron, J.-S., Dabbous, N.: Differential power analysis in the presence of hardware countermeasures. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252-263. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1965 , pp. 252-263
    • Clavier, C.1    Coron, J.-S.2    Dabbous, N.3
  • 3
    • 78049335572 scopus 로고    scopus 로고
    • Analysis and improvement of the random delay counter-measure of CHES 2009
    • Mangard, S., Standaert, F.-X. (eds.) CHES 2010. Springer, Heidelberg
    • Coron, J.-S., Kizhvatov, I.: Analysis and improvement of the random delay counter-measure of CHES 2009. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 95-109. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6225 , pp. 95-109
    • Coron, J.-S.1    Kizhvatov, I.2
  • 4
    • 20744449792 scopus 로고    scopus 로고
    • The design and implementation of FFTW3
    • Frigo, M., Johnson, S.G.: The design and implementation of FFTW3. Proceedings of the IEEE 93(2), 216-231 (2005)
    • (2005) Proceedings of the IEEE , vol.93 , Issue.2 , pp. 216-231
    • Frigo, M.1    Johnson, S.G.2
  • 5
    • 27244449350 scopus 로고    scopus 로고
    • EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA
    • Rao, J.R., Sunar, B. (eds.) CHES 2005. Springer, Heidelberg
    • Gebotys, C.H., Ho, S., Tiu, C.C.: EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 250-264. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3659 , pp. 250-264
    • Gebotys, C.H.1    Ho, S.2    Tiu, C.C.3
  • 6
    • 33750688161 scopus 로고    scopus 로고
    • High-resolution sidechannel attack using phase-based waveform matching
    • Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
    • Homma, N., Nagashima, S., Imai, Y., Aoki, T., Satoh, A.: High-resolution sidechannel attack using phase-based waveform matching. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 187-200. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4249 , pp. 187-200
    • Homma, N.1    Nagashima, S.2    Imai, Y.3    Aoki, T.4    Satoh, A.5
  • 7
    • 77951292810 scopus 로고    scopus 로고
    • A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks
    • Homma, N., Nagashima, S., Sugawara, T., Aoki, T., Satoh, A.: A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks. IEICE Transactions 91-A(1), 193-202 (2008)
    • (2008) IEICE Transactions , vol.91 A , Issue.1 , pp. 193-202
    • Homma, N.1    Nagashima, S.2    Sugawara, T.3    Aoki, T.4    Satoh, A.5
  • 8
    • 70349665363 scopus 로고    scopus 로고
    • Deconvolving Protected Signals
    • IEEE Computer Society Press, Fukuoka
    • Kafi, M., Guilley, S., Marcello, S., Naccache, D.: Deconvolving Protected Signals. In: ARES/CISIS, March 16-19, pp. 687-694. IEEE Computer Society Press, Fukuoka (2009)
    • (2009) ARES/CISIS, March 16-19 , pp. 687-694
    • Kafi, M.1    Guilley, S.2    Marcello, S.3    Naccache, D.4
  • 9
    • 76649098851 scopus 로고    scopus 로고
    • EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
    • Youm, H.Y., Yung, M. (eds.) WISA 2009. Springer, Heidelberg
    • Kasper, T., Oswald, D., Paar, C.: EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol. 5932, pp. 79-93. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5932 , pp. 79-93
    • Kasper, T.1    Oswald, D.2    Paar, C.3
  • 10
    • 34247278256 scopus 로고    scopus 로고
    • Power Attacks on Secure Hardware Based on Early Propagation of Data
    • IEEE Computer Society, Los Alamitos
    • Kulikowski, K.J., Karpovsky,M.G., Taubin, A.: Power Attacks on Secure Hardware Based on Early Propagation of Data. In: IOLTS Como, Italy, pp. 131-138. IEEE Computer Society, Los Alamitos (2006)
    • (2006) IOLTS Como, Italy , pp. 131-138
    • Kulikowski, K.J.1    Karpovsky, M.G.2    Taubin, A.3
  • 11
    • 33750688820 scopus 로고    scopus 로고
    • A Proposition for Correlation Power Analysis Enhancement
    • Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
    • Le, T.-H., Clédière, J., Canovas, C., Robisson, B., Servière, C., Lacoume, J.-L.: A Proposition for Correlation Power Analysis Enhancement. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 174-186. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4249 , pp. 174-186
    • Clédière, J.1    Canovas, C.2    Robisson, B.3    Servière, C.4    Lacoume, J.-L.5
  • 12
    • 35048819488 scopus 로고    scopus 로고
    • Hardware countermeasures against DPA - A statistical analysis of their effectiveness
    • Okamoto, T. (ed.) CT-RSA 2004. Springer, Heidelberg
    • Mangard, S.: Hardware countermeasures against DPA - A statistical analysis of their effectiveness. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 222-235. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2964 , pp. 222-235
    • Mangard, S.1
  • 15
    • 34548823012 scopus 로고    scopus 로고
    • DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure
    • IEEE Computer Society, Los Alamitos doi:10.1109/ISCAS.2007.378024
    • Nagashima, S., Homma, N., Imai, Y., Aoki, T., Satoh, A.: DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure. In: ISCAS, May 27-20, pp. 1807-1810. IEEE Computer Society, Los Alamitos (2007), doi:10.1109/ISCAS.2007.378024
    • (2007) ISCAS, May 27-20 , pp. 1807-1810
    • Nagashima, S.1    Homma, N.2    Imai, Y.3    Aoki, T.4    Satoh, A.5
  • 16
    • 49749140694 scopus 로고    scopus 로고
    • Defeating classical Hardware Countermeasures: A new processing for Side Channel Analysis
    • IEEE Computer Society, Los Alamitos
    • Réal, D., Canovas, C., Clédière, J., Drissi, M., Valette, F.: Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis. In: DATE, Munich, Germany, March 10-14, pp. 1274-1279. IEEE Computer Society, Los Alamitos (2008)
    • (2008) DATE, Munich, Germany, March 10-14 , pp. 1274-1279
    • Réal, D.1    Canovas, C.2    Clédière, J.3    Drissi, M.4    Valette, F.5
  • 17
    • 70350578892 scopus 로고    scopus 로고
    • Higher-order masking and shuffling for software implementations of block ciphers
    • Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
    • Rivain, M., Prouff, E., Doget, J.: Higher-order masking and shuffling for software implementations of block ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 171-188. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5747 , pp. 171-188
    • Rivain, M.1    Prouff, E.2    Doget, J.3
  • 18
    • 67650694228 scopus 로고    scopus 로고
    • A unified framework for the analysis of side-channel key recovery attacks
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Standaert, F.-X., Malkin, T.G., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443-461. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 443-461
    • Standaert, F.-X.1    Malkin, T.G.2    Yung, M.3
  • 19
    • 37149055946 scopus 로고    scopus 로고
    • Security evaluation of DPA countermeasures using dualrail pre-charge logic style
    • Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
    • Suzuki, D., Saeki, M.: Security evaluation of DPA countermeasures using dualrail pre-charge logic style. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 255-269. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4249 , pp. 255-269
    • Suzuki, D.1    Saeki, M.2
  • 20
    • 77950477941 scopus 로고    scopus 로고
    • TELECOM ParisTech SEN research group 1st. edn.
    • TELECOM ParisTech SEN research group. DPA Contest, 1st. edn. (2008-2009), http://www.DPAcontest.org/
    • (2008) DPA Contest
  • 21
    • 37149030674 scopus 로고    scopus 로고
    • Efficient Use of Random Delays in Embedded Software
    • Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. Springer, Heidelberg
    • Tunstall, M., Benoit, O.: Efficient Use of Random Delays in Embedded Software. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 27-38. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4462 , pp. 27-38
    • Tunstall, M.1    Benoit, O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.