메뉴 건너뛰기




Volumn 5, Issue 2, 2011, Pages 100-110

One for all - All for one: Unifying standard differential power analysis attacks

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK SCENARIOS; CONDITIONAL ENTROPY; CORRELATION ANALYSIS; CORRELATION COEFFICIENT; DIFFERENTIAL POWER ANALYSIS; DIFFERENTIAL POWER ANALYSIS ATTACK; DPA ATTACKS; FIRST-ORDER; KEY RECOVERY; LEAKAGE MODEL; MUTUAL INFORMATIONS; POWER TRACES; SIDE CHANNEL ATTACK; UNIVARIATE;

EID: 79959430513     PISSN: 17518709     EISSN: 17518717     Source Type: Journal    
DOI: 10.1049/iet-ifs.2010.0096     Document Type: Article
Times cited : (160)

References (23)
  • 1
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Santa Barbara, CA, USA, August, (LNCS, 1666)
    • Kocher, P.C., Jaffe, J., and Jun, B.: ' Differential power analysis ', Proc. CHES 1999, Santa Barbara, CA, USA, August, 1999, p. 388-397, (LNCS, 1666)
    • (1999) Proc. CHES 1999 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 2
    • 84957079591 scopus 로고    scopus 로고
    • Towards sound approaches to counteract power analysis attacks
    • Santa Barbara, CA, USA, August, (LNCS, 1666)
    • Chari, S., Jutla, C.S., Rao, J.R., and Rohatgi, P.: ' Towards sound approaches to counteract power analysis attacks ', Proc. CRYPTO 1999, Santa Barbara, CA, USA, August, 1999, p. 398-412, (LNCS, 1666)
    • (1999) Proc. CRYPTO 1999 , pp. 398-412
    • Chari, S.1    Jutla, C.S.2    Rao, J.R.3    Rohatgi, P.4
  • 3
    • 45749097439 scopus 로고    scopus 로고
    • Randomised representations
    • 10.1049/iet-ifs:20070017
    • Smart, N.P., Page, D., and Oswald, E.: ' Randomised representations ', IET Inf. Secur., 2008, 2, (2), p. 19-27 10.1049/iet-ifs:20070017
    • (2008) IET Inf. Secur. , vol.2 , Issue.2 , pp. 19-27
    • Smart, N.P.1    Page, D.2    Oswald, E.3
  • 4
    • 35048852134 scopus 로고    scopus 로고
    • Physically Observable Cryptography
    • Theory of Cryptography First Theory of Cryptography Conference, TCC 2004 Cambridge, MA, USA, February 19-21, 2004 Proceedings
    • Micali, S., and Reyzin, L.: ' Physically observable cryptography ', Proc. TCC 2004, Cambridge, MA, USA, February, 2004, p. 278-296, (LNCS, 2951) (Pubitemid 38236631)
    • (2004) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2951 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 5
    • 67650694228 scopus 로고    scopus 로고
    • A unified framework for the analysis of side-channel key recovery attacks
    • Cologne, Germany, April. (LNCS, 5479)
    • Standaert, F.-X., Malkin, T.G., and Yung, M.: ' A unified framework for the analysis of side-channel key recovery attacks ', Proc. Eurocrypt 2009, Cologne, Germany, April, 2009, p. 443-461, (LNCS, 5479)
    • (2009) Proc. Eurocrypt 2009 , pp. 443-461
    • Standaert, F.-X.1    Malkin, T.G.2    Yung, M.3
  • 6
    • 35048818034 scopus 로고    scopus 로고
    • Correlation power analysis with a leakage model
    • Boston, MA, USA, August (LNCS, 3156)
    • Brier, E., Clavier, C., and Olivier, F.: ' Correlation power analysis with a leakage model ', Proc. CHES 2004, Boston, MA, USA, August, 2004, p. 16-29, (LNCS, 3156)
    • (2004) Proc. CHES 2004 , pp. 16-29
    • Brier, E.1    Clavier, C.2    Olivier, F.3
  • 7
    • 51049117070 scopus 로고    scopus 로고
    • Mutual information analysis
    • Washington DC, USA, August. (LNCS, 5154)
    • Gierlichs, B., Batina, L., Tuyls, P., and Preneel, B.: ' Mutual information analysis ', Proc. CHES 2008, Washington DC, USA, August, 2008, p. 426-442, (LNCS, 5154)
    • (2008) Proc. CHES 2008 , pp. 426-442
    • Gierlichs, B.1    Batina, L.2    Tuyls, P.3    Preneel, B.4
  • 8
    • 78650838653 scopus 로고    scopus 로고
    • The world is not enough: Another look on second-order DPA
    • et al. ' ', Singapore, December. (LNCS, 6477)
    • Standaert, F.X., Veyrat-Charvillon, N., and Oswald, E.: et al. ' The world is not enough: another look on second-order DPA ', Proc. Asiacrypt 2010, Singapore, December, 2010, p. 112-129, (LNCS, 6477)
    • (2010) Proc. Asiacrypt 2010 , pp. 112-129
    • Standaert, F.X.1    Veyrat-Charvillon, N.2    Oswald, E.3
  • 9
    • 27244432445 scopus 로고    scopus 로고
    • A stochastic model for differential side channel cryptanalysis
    • Cryptographic Hardware and Embedded Systems - CHES 2005: 7th International Workshop. Proceedings
    • Schindler, W., Lemke, K., and Paar, C.: ' A stochastic model for differential side-channel cryptanalysis ', Proc. CHES 2005, Edinburgh, Scotland, September, 2005, p. 30-46, (LNCS, 3659) (Pubitemid 41520697)
    • (2005) Lecture Notes in Computer Science , vol.3659 , pp. 30-46
    • Schindler, W.1    Lemke, K.2    Paar, C.3
  • 11
    • 35248899532 scopus 로고    scopus 로고
    • Template attacks
    • Redwood Shores, CA, USA, August. (LNCS, 2523)
    • Chari, S., Rao, J.R., and Rohatgi, P.: ' Template attacks ', Proc. CHES 2002, Redwood Shores, CA, USA, August, 2002, p. 13-28, (LNCS, 2523)
    • (2002) Proc. CHES 2002 , pp. 13-28
    • Chari, S.1    Rao, J.R.2    Rohatgi, P.3
  • 12
    • 84937438279 scopus 로고    scopus 로고
    • Power analysis, what is now possible
    • Kyoto, Japan, December. (LNCS, 1976)
    • Akkar, M.-L., Bevan, R., Dischamp, P., and Moyart, D.: ' Power analysis, what is now possible ', Proc. Asiacrypt 2000, Kyoto, Japan, December, 2000, p. 489-502, (LNCS, 1976)
    • (2000) Proc. Asiacrypt 2000 , pp. 489-502
    • Akkar, M.-L.1    Bevan, R.2    Dischamp, P.3    Moyart, D.4
  • 13
    • 26444525726 scopus 로고    scopus 로고
    • DPA attacks and S-boxes
    • Fast Software Encryption: 12th International Workshop, FSE 2005. Revised Selected Papers
    • Prouff, E.: ' DPA attacks and S-boxes ', Proc. FSE 2005, Paris, France, February, 2005, p. 424-441, (LNCS, 3557) (Pubitemid 41425180)
    • (2005) Lecture Notes in Computer Science , vol.3557 , pp. 424-441
    • Prouff, E.1
  • 14
    • 33750693916 scopus 로고    scopus 로고
    • Towards security limits in side-channel attacks
    • Yokohama, Japan, October. (LNCS, 4249)
    • Standaert, F.-X., Peeters, E., Archambeau, C., and Quisquater, J.-J.: ' Towards security limits in side-channel attacks ', Proc. CHES 2006, Yokohama, Japan, October, 2006, p. 30-45, (LNCS, 4249)
    • (2006) Proc. CHES 2006 , pp. 30-45
    • Standaert, F.-X.1    Peeters, E.2    Archambeau, C.3    Quisquater, J.-J.4
  • 15
    • 0012022904 scopus 로고    scopus 로고
    • A note regarding evaluation of AES candidates on smart-cards
    • Rome, Italy, March
    • Chari, S., Jutla, C.S., Rao, J.R., and Rohatgi, P.: ' A note regarding evaluation of AES candidates on smart-cards ', Proc. Second AES Candidate Conf., Rome, Italy, March, 1999, p. 133-147
    • (1999) Proc. Second AES Candidate Conf. , pp. 133-147
    • Chari, S.1    Jutla, C.S.2    Rao, J.R.3    Rohatgi, P.4
  • 16
    • 0001884734 scopus 로고
    • On the frequency function of xy
    • 10.1214/aoms/1177732541
    • Craig, C.: ' On the frequency function of xy ', Ann. Math. Stat., 1936, 7, (1), p. 1-15 10.1214/aoms/1177732541
    • (1936) Ann. Math. Stat. , vol.7 , Issue.1 , pp. 1-15
    • Craig, C.1
  • 17
    • 67049146380 scopus 로고    scopus 로고
    • Partition vs. comparison side-channel distingsuishers: An empirical evaluation of statistical tests for univariate side-channel attacks
    • Seoul, Korea, December. (LNCS, 5461)
    • Standaert, F.-X., Gierlichs, B., and Verbauwhede, I.: ' Partition vs. comparison side-channel distingsuishers: an empirical evaluation of statistical tests for univariate side-channel attacks ', Proc. ICISC 2008, Seoul, Korea, December, 2008, p. 253-267, (LNCS, 5461)
    • (2008) Proc. ICISC 2008 , pp. 253-267
    • Standaert, F.-X.1    Gierlichs, B.2    Verbauwhede, I.3
  • 18
    • 35248825993 scopus 로고    scopus 로고
    • Securing encryption algorithms against DPA at the logic level: Next generation smart card technology
    • Cologne, Germany, September. (LNCS, 2779)
    • Tiri, K., and Verbauwhede, I.: ' Securing encryption algorithms against DPA at the logic level: next generation smart card technology ', Proc. CHES 2003, Cologne, Germany, September, 2003, p. 125-136, (LNCS, 2779)
    • (2003) Proc. CHES 2003 , pp. 125-136
    • Tiri, K.1    Verbauwhede, I.2
  • 19
    • 3042604811 scopus 로고    scopus 로고
    • A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation
    • Paris, France, February
    • Tiri, K., and Verbauwhede, I.: ' A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation ', Proc. DATE 2004 (IEEE), Paris, France, February, 2004, p. 246-251
    • (2004) Proc. DATE 2004 (IEEE) , pp. 246-251
    • Tiri, K.1    Verbauwhede, I.2
  • 20
    • 70350589228 scopus 로고    scopus 로고
    • Mutual information analysis: How, when and why?
    • Lausanne, Switzerland, Spetember. (LNCS, 5747)
    • Veyrat-Charvillon, N., and Standaert, F.-X.: ' Mutual information analysis: how, when and why? ', Proc. CHES 2009, Lausanne, Switzerland, Spetember, 2009, p. 429-443, (LNCS, 5747)
    • (2009) Proc. CHES 2009 , pp. 429-443
    • Veyrat-Charvillon, N.1    Standaert, F.-X.2
  • 21
    • 79959451800 scopus 로고    scopus 로고
    • accessed December 2010
    • http://www.dpacontest.org, accessed December 2010
  • 22
    • 35048819488 scopus 로고    scopus 로고
    • Hardware countermeasures against DPA - A statistical analysis of their effectiveness
    • San Francisco, CA, USA, Feburary. (LNCS, 2964)
    • Mangard, S.: ' Hardware countermeasures against DPA - a statistical analysis of their effectiveness ', Proc. CT-RSA 2004, San Francisco, CA, USA, Feburary, 2004, p. 222-235, (LNCS, 2964)
    • (2004) Proc. CT-RSA 2004 , pp. 222-235
    • Mangard, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.