메뉴 건너뛰기




Volumn 6917 LNCS, Issue , 2011, Pages 256-272

Extractors against side-channel attacks: Weak or strong?

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK STRATEGIES; BLOCK CIPHERS; LEAKAGE-RESILIENCE; PSEUDO-RANDOM FUNCTIONS; RANDOMNESS EXTRACTORS; RIJNDAEL; SECURITY EVALUATION; SECURITY MARGINS; SECURITY POINT; SIDE CHANNEL ATTACK; SIDE-CHANNEL; STREAM CIPHERS;

EID: 80053533371     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-23951-9_17     Document Type: Conference Paper
Times cited : (3)

References (19)
  • 1
    • 84957079591 scopus 로고    scopus 로고
    • Towards Sound Approaches to Counteract Power-Analysis Attacks
    • Wiener, M.J. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398-412. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 398-412
    • Chari, S.1    Jutla, C.S.2    Rao, J.R.3    Rohatgi, P.4
  • 2
    • 77956996186 scopus 로고    scopus 로고
    • Leakage-Resilient Pseudorandom Functions and Side- Channel Attacks on Feistel Networks
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Dodis, Y., Pietrzak, K.: Leakage-Resilient Pseudorandom Functions and Side- Channel Attacks on Feistel Networks. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 21-40. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 21-40
    • Dodis, Y.1    Pietrzak, K.2
  • 3
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-Resilient Cryptography
    • IEEE Computer Society, Los Alamitos
    • Dziembowski, S., Pietrzak, K.: Leakage-Resilient Cryptography. In: FOCS, pp. 293-302. IEEE Computer Society, Los Alamitos (2008)
    • (2008) FOCS , pp. 293-302
    • Dziembowski, S.1    Pietrzak, K.2
  • 4
    • 77949631657 scopus 로고    scopus 로고
    • Leakage-resilient signatures
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Faust, S., Kiltz, E., Pietrzak, K., Rothblum, G.N.: Leakage-resilient signatures. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 343-360. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 343-360
    • Faust, S.1    Kiltz, E.2    Pietrzak, K.3    Rothblum, G.N.4
  • 5
    • 51049117070 scopus 로고    scopus 로고
    • Mutual Information Analysis
    • Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
    • Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual Information Analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426-442. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5154 , pp. 426-442
    • Gierlichs, B.1    Batina, L.2    Tuyls, P.3    Preneel, B.4
  • 6
    • 35248830819 scopus 로고    scopus 로고
    • Multiplicative Masking and Power Analysis of AES
    • Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
    • Golic, J.D., Tymen, C.: Multiplicative Masking and Power Analysis of AES. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 198-212. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2523 , pp. 198-212
    • Golic, J.D.1    Tymen, C.2
  • 7
    • 84949520149 scopus 로고    scopus 로고
    • DES and Differential Power Analysis (The "Duplication"Method)
    • Koç, Ç.K., Paar, C. (eds.) CHES 1999. Springer, Heidelberg
    • Goubin, L., Patarin, J.: DES and Differential Power Analysis (The "Duplication"Method). In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 158-172. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1717 , pp. 158-172
    • Goubin, L.1    Patarin, J.2
  • 8
    • 84991939136 scopus 로고
    • LFSR-Based Hashing and Authentication
    • Desmedt, Y. (ed.) CRYPTO 1994. Springer, Heidelberg
    • Krawczyk, H.: LFSR-Based Hashing and Authentication. In: Desmedt, Y. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129-139. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 129-139
    • Krawczyk, H.1
  • 10
    • 77955912333 scopus 로고    scopus 로고
    • One for All - All for One: Unifying Standard DPA Attacks
    • Report 2009/449
    • Mangard, S., Oswald, E., Standaert, F.-X.: One for All - All for One: Unifying Standard DPA Attacks. Cryptology ePrint Archive, Report 2009/449 (2009), http://eprint.iacr.org/ to appear in IET Information Security
    • (2009) Cryptology
    • Mangard, S.1    Oswald, E.2    Standaert, F.-X.3
  • 11
    • 80053462411 scopus 로고    scopus 로고
    • Extractors Against Side-Channel Attacks: Weak or Strong?
    • Report 2011/348
    • Medwed, M., Standaert, F.-X.: Extractors Against Side-Channel Attacks: Weak or Strong? Cryptology ePrint Archive, Report 2011/348 (2011), http://eprint.iacr.org/
    • (2011) Cryptology
    • Medwed, M.1    Standaert, F.-X.2
  • 12
    • 70350303869 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Resilient to Key Leakage
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Naor, M., Segev, G.: Public-Key Cryptosystems Resilient to Key Leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 18-35. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 18-35
    • Naor, M.1    Segev, G.2
  • 13
    • 66049085129 scopus 로고    scopus 로고
    • Statistical Analysis of Second Order Differential Power Analysis. IEEE Trans
    • Prouff, E., Rivain, M., Bevan, R.: Statistical Analysis of Second Order Differential Power Analysis. IEEE Trans. Computers 58(6), 799-811 (2009)
    • (2009) Computers , vol.58 , Issue.6 , pp. 799-811
    • Prouff, E.1    Rivain, M.2    Bevan, R.3
  • 14
    • 77955866745 scopus 로고    scopus 로고
    • How Leaky Is an Extractor?
    • Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. Springer, Heidelberg
    • Standaert, F.-X.: How Leaky Is an Extractor? In: Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. LNCS, vol. 6212, pp. 294-304. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6212 , pp. 294-304
    • Standaert, F.-X.1
  • 15
    • 67650694228 scopus 로고    scopus 로고
    • A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Standaert, F.-X., Malkin, T., Yung, M.: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443-461. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 443-461
    • Standaert, F.-X.1    Malkin, T.2    Yung, M.3
  • 17
    • 78650838653 scopus 로고    scopus 로고
    • The World Is Not Enough: Another Look on Second- Order DPA
    • Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
    • Standaert, F.-X., Veyrat-Charvillon, N., Oswald, E., Gierlichs, B., Medwed, M., Kasper, M., Mangard, S.: The World Is Not Enough: Another Look on Second- Order DPA. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 112-129. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6477 , pp. 112-129
    • Standaert, F.-X.1    Veyrat-Charvillon, N.2    Oswald, E.3    Gierlichs, B.4    Medwed, M.5    Kasper, M.6    Mangard, S.7
  • 18
    • 79956308378 scopus 로고    scopus 로고
    • Adaptive Chosen-Message Side-Channel Attacks
    • Zhou, J., Yung, M. (eds.) ACNS 2010. Springer, Heidelberg
    • Veyrat-Charvillon, N., Standaert, F.-X.: Adaptive Chosen-Message Side-Channel Attacks. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 186-199. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6123 , pp. 186-199
    • Veyrat-Charvillon, N.1    Standaert, F.-X.2
  • 19
    • 78650013814 scopus 로고    scopus 로고
    • Practical leakage-resilient pseudorandom generators
    • Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM, New York
    • Yu, Y., Standaert, F.-X., Pereira, O., Yung, M.: Practical leakage-resilient pseudorandom generators. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM Conference on Computer and Communications Security, pp. 141-151. ACM, New York (2010)
    • (2010) ACM Conference on Computer and Communications Security , pp. 141-151
    • Yu, Y.1    Standaert, F.-X.2    Pereira, O.3    Yung, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.