메뉴 건너뛰기




Volumn 6917 LNCS, Issue , 2011, Pages 95-107

A fast and provably secure higher-order masking of AES S-box

Author keywords

AES; differential power analysis; higher order DPA; higher order masking; side channel attack

Indexed keywords

AES; COMPOSITE FIELDS; COMPUTATION TIME; DIFFERENTIAL POWER ANALYSIS; EMBEDDED PROCESSORS; HIGHER ORDER; LOOKUP OPERATIONS; MASKING SCHEMES; PRE-COMPUTATION; PROVABLY SECURE; SECOND ORDERS; SIDE CHANNEL ATTACK; THIRD-ORDER;

EID: 80053483211     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-23951-9_7     Document Type: Conference Paper
Times cited : (77)

References (22)
  • 2
  • 3
    • 84943615552 scopus 로고    scopus 로고
    • An Implementation of des and AES, Secure against Some Attacks
    • Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. Springer, Heidelberg
    • Akkar, M.-L., Giraud, C.: An Implementation of DES and AES, Secure against Some Attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 309-318. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2162 , pp. 309-318
    • Akkar, M.-L.1    Giraud, C.2
  • 4
    • 0025530315 scopus 로고
    • The Structured Design of Cryptographically Good SBoxes
    • Adams, C., Tavares, S.: The Structured Design of Cryptographically Good SBoxes. Journal of Cryptology 3(1), 27-42 (1990)
    • (1990) Journal of Cryptology , vol.3 , Issue.1 , pp. 27-42
    • Adams, C.1    Tavares, S.2
  • 5
    • 35048848490 scopus 로고    scopus 로고
    • Provably SecureMasking of AES
    • Handschuh, H., Hasan, M.A. (eds.) SAC 2004. Springer, Heidelberg
    • Blömer, J., Guajardo, J., Krummel, V.: Provably SecureMasking of AES. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 69-83. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3357 , pp. 69-83
    • Blömer, J.1    Guajardo, J.2    Krummel, V.3
  • 6
    • 84949023413 scopus 로고
    • On the Distribution of Characteristics in Bijective Mappings
    • Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
    • O'Connor, L.: On the Distribution of Characteristics in Bijective Mappings. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 360-370. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.765 , pp. 360-370
    • O'Connor, L.1
  • 7
    • 38049064396 scopus 로고    scopus 로고
    • Side Channel Cryptanalysis of a Higher Order Masking Scheme
    • Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
    • Coron, J.-S., Prouff, E., Rivain, M.: Side Channel Cryptanalysis of a Higher Order Masking Scheme. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 28-44. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4727 , pp. 28-44
    • Coron, J.-S.1    Prouff, E.2    Rivain, M.3
  • 8
    • 38149026169 scopus 로고    scopus 로고
    • Blind Differential Cryptanalysis for Enhanced Power Attacks
    • Biham, E., Youssef, A.M. (eds.) SAC 2006. Springer, Heidelberg
    • Handschuh, H., Preneel, B.: Blind Differential Cryptanalysis for Enhanced Power Attacks. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 163-173. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4356 , pp. 163-173
    • Handschuh, H.1    Preneel, B.2
  • 11
    • 77953385519 scopus 로고    scopus 로고
    • Efficient Masking Methods Appropriate for the Block Ciphers ARIA and AES
    • Kim, H., Kim, T., Han, D., Hong, S.: Efficient Masking Methods Appropriate for the Block Ciphers ARIA and AES. ETRI Journal 32(3), 370-379 (2010)
    • (2010) ETRI Journal , vol.32 , Issue.3 , pp. 370-379
    • Kim, H.1    Kim, T.2    Han, D.3    Hong, S.4
  • 12
    • 70350148515 scopus 로고    scopus 로고
    • Improved Side-Channel Attack on des with the First Four Rounds Masked
    • Kim, J., Hong, S., Han, D., Lee, S.: Improved Side-Channel Attack on DES with the First Four Rounds Masked. ETRI Journal 31(5), 625-627 (2009)
    • (2009) ETRI Journal , vol.31 , Issue.5 , pp. 625-627
    • Kim, J.1    Hong, S.2    Han, D.3    Lee, S.4
  • 13
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 14
    • 68549099555 scopus 로고    scopus 로고
    • Using Second-Order Power Analysis to Attack DPA Resistant Software
    • Paar, C., Koç, Ç.K. (eds.) CHES 2000. Springer, Heidelberg
    • Messerges, T.S.: Using Second-Order Power Analysis to Attack DPA Resistant Software. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 238-251. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1965 , pp. 238-251
    • Messerges, T.S.1
  • 15
    • 26444465110 scopus 로고    scopus 로고
    • A side-channel analysis resistant description of the AES S-box
    • Fast Software Encryption: 12th International Workshop, FSE 2005. Revised Selected Papers
    • Oswald, E., Mangard, S., Pramstaller, N., Rijmen, V.: A Side-Channel Analysis Resistant Description of the AES S-Box. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 413-423. Springer, Heidelberg (2005) (Pubitemid 41425179)
    • (2005) Lecture Notes in Computer Science , vol.3557 , pp. 413-423
    • Oswald, E.1    Mangard, S.2    Pramstaller, N.3    Rijmen, V.4
  • 16
    • 33744946821 scopus 로고    scopus 로고
    • An Efficient Masking Scheme for AES Software Implementations
    • Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. Springer, Heidelberg
    • Oswald, E., Schramm, K.: An Efficient Masking Scheme for AES Software Implementations. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 292-305. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3786 , pp. 292-305
    • Oswald, E.1    Schramm, K.2
  • 17
    • 50249140648 scopus 로고    scopus 로고
    • Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
    • Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
    • Rivain, M., Dottax, E., Prouff, E.: Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 127-143. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5086 , pp. 127-143
    • Rivain, M.1    Dottax, E.2    Prouff, E.3
  • 18
    • 78049343104 scopus 로고    scopus 로고
    • Provably Secure Higher-Order Masking of AES
    • Mangard, S., Standaert, F.-X. (eds.) CHES 2010. Springer, Heidelberg
    • Rivain, M., Prouff, E.: Provably Secure Higher-Order Masking of AES. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 413-427. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6225 , pp. 413-427
    • Rivain, M.1    Prouff, E.2
  • 19
    • 84942466169 scopus 로고    scopus 로고
    • Provably Secure Higher-Order Masking of AES
    • Rivain, M., Prouff, E.: Provably Secure Higher-Order Masking of AES, Cryptology ePrint Archive (2010), http://eprint.iacr.org/
    • (2010) Cryptology ePrint Archive
    • Rivain, M.1    Prouff, E.2
  • 20
    • 84944877872 scopus 로고    scopus 로고
    • Efficient Rijndael Encryption Implementation with Composite Field Arithmetic
    • Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. Springer, Heidelberg
    • Rudra, A., Dubey, P.K., Jutla, C.S., Kumar, V., Rao, J.R., Rohatgi, P.: Efficient Rijndael Encryption Implementation with Composite Field Arithmetic. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 171-188. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2162 , pp. 171-188
    • Rudra, A.1    Dubey, P.K.2    Jutla, C.S.3    Kumar, V.4    Rao, J.R.5    Rohatgi, P.6
  • 21
    • 84946832086 scopus 로고    scopus 로고
    • A Compact Rijndael Hardware Architecture with S-Box Optimization
    • Advances in Cryptology - ASIACRYPT 2001
    • Satoh, A., Morioka, S., Takano, K., Munetoh, S.: A Compact Rijndael Hardware Architecture with S-Box Optimization. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 239-254. Springer, Heidelberg (2001) (Pubitemid 33371189)
    • (2002) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2248 , pp. 239-254
    • Satoh, A.1    Morioka, S.2    Takano, K.3    Munetoh, S.4
  • 22
    • 33745652931 scopus 로고    scopus 로고
    • Higher Order Masking of the AES
    • Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
    • Schramm, K., Paar, C.: Higher Order Masking of the AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 208-225. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3860 , pp. 208-225
    • Schramm, K.1    Paar, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.