메뉴 건너뛰기




Volumn 7079 LNCS, Issue , 2011, Pages 115-132

Fresh re-keying II: Securing multiple parties against side-channel and fault attacks

Author keywords

Fault attacks; Masking; Re keying; Shuffling; Side channel attacks

Indexed keywords

8-BIT MICROCONTROLLERS; AUTOMOTIVE APPLICATIONS; FAULT ATTACK; HOSTILE ENVIRONMENTS; ITS EFFICIENCIES; PHYSICAL ATTACKS; PROTECTION MECHANISMS; RE-KEYING; RESOURCE-CONSTRAINED; RF-ID TAGS; SECURITY-AWARE; SHUFFLING; SIDE CHANNEL ATTACK; SIDE-CHANNEL;

EID: 84055192288     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-27257-8_8     Document Type: Conference Paper
Times cited : (27)

References (31)
  • 1
    • 84855460277 scopus 로고    scopus 로고
    • Probability in hashing
    • The Department of Computer Science at Chapter 18
    • The Department of Computer Science at Duke University, Discrete Mathematics for Computer Science lecture, Chapter 18: Probability in hashing (2009), http://www.cs.duke.edu/courses/cps102/spring09/Lectures/L-18.pdf
    • (2009) Discrete Mathematics for Computer Science Lecture
  • 2
    • 0037624935 scopus 로고    scopus 로고
    • Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard
    • Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard. IEEE Trans. Computers 52(4), 492-505 (2003)
    • (2003) IEEE Trans. Computers , vol.52 , Issue.4 , pp. 492-505
    • Bertoni, G.1    Breveglieri, L.2    Koren, I.3    Maistri, P.4    Piuri, V.5
  • 3
    • 38549140491 scopus 로고    scopus 로고
    • Improved Side-Channel Collision Attacks on AES
    • Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. Springer, Heidelberg
    • Bogdanov, A.: Improved Side-Channel Collision Attacks on AES. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 84-95. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4876 , pp. 84-95
    • Bogdanov, A.1
  • 4
    • 84957079591 scopus 로고    scopus 로고
    • Towards Sound Approaches to Counteract Power-Analysis Attacks
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398-412. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 398-412
    • Chari, S.1    Jutla, C.S.2    Rao, J.R.3    Rohatgi, P.4
  • 5
    • 77956996186 scopus 로고    scopus 로고
    • Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Dodis, Y., Pietrzak, K.: Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 21-40. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 21-40
    • Dodis, Y.1    Pietrzak, K.2
  • 6
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-Resilient Cryptography
    • IEEE Computer Society
    • Dziembowski, S., Pietrzak, K.: Leakage-Resilient Cryptography. In: FOCS, pp. 293-302. IEEE Computer Society (2008)
    • (2008) FOCS , pp. 293-302
    • Dziembowski, S.1    Pietrzak, K.2
  • 7
    • 77949749772 scopus 로고    scopus 로고
    • Power Analysis Resistant AES Implementation for Passive RFID Tags
    • Lackner, C., Ostermann, T., Sams, M., Spilka, R. (eds.) ISBN978-3-200-01330-8
    • Feldhofer, M., Popp, T.: Power Analysis Resistant AES Implementation for Passive RFID Tags. In: Lackner, C., Ostermann, T., Sams, M., Spilka, R. (eds.) Proceedings of Austrochip 2008, Linz, Austria, October 8, pp. 1-6 (2008) ISBN978-3-200-01330-8
    • (2008) Proceedings of Austrochip 2008, Linz, Austria, October 8 , pp. 1-6
    • Feldhofer, M.1    Popp, T.2
  • 8
    • 79960091382 scopus 로고    scopus 로고
    • Montgomery's Trick and Fast Implementation of Masked AES
    • Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. Springer, Heidelberg
    • Genelle, L., Prouff, E., Quisquater, M.: Montgomery's Trick and Fast Implementation of Masked AES. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 153-169. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6737 , pp. 153-169
    • Genelle, L.1    Prouff, E.2    Quisquater, M.3
  • 9
    • 35248830819 scopus 로고    scopus 로고
    • Multiplicative Masking and Power Analysis of AES
    • Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
    • Golic, J.D., Tymen, C.: Multiplicative Masking and Power Analysis of AES. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 198-212. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2523 , pp. 198-212
    • Golic, J.D.1    Tymen, C.2
  • 10
    • 84949520149 scopus 로고    scopus 로고
    • DES and Differential Power Analysis (The "Duplication"Method)
    • Koç, Ç.K., Paar, C. (eds.) CHES 1999. Springer, Heidelberg
    • Goubin, L., Patarin, J.: DES and Differential Power Analysis (The "Duplication"Method). In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 158-172. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1717 , pp. 158-172
    • Goubin, L.1    Patarin, J.2
  • 12
    • 0036913523 scopus 로고    scopus 로고
    • Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers
    • Karri, R., Wu, K., Mishra, P., Kim, Y.: Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers. IEEE Trans. on CAD of Integrated Circuits and Systems 21(12), 1509-1517 (2002)
    • (2002) IEEE Trans. on CAD of Integrated Circuits and Systems , vol.21 , Issue.12 , pp. 1509-1517
    • Karri, R.1    Wu, K.2    Mishra, P.3    Kim, Y.4
  • 14
    • 35048824462 scopus 로고    scopus 로고
    • Enhancing Collision Attacks
    • Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
    • Ledig, H., Muller, F., Valette, F.: Enhancing Collision Attacks. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 176-190. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3156 , pp. 176-190
    • Ledig, H.1    Muller, F.2    Valette, F.3
  • 15
    • 35248892041 scopus 로고    scopus 로고
    • A Simple Power-Analysis (SPA) Attackon Implementations of the AES Key Expansion
    • Lee, P.J., Lim, C.H. (eds.) ICISC 2002. Springer, Heidelberg
    • Mangard, S.: A Simple Power-Analysis (SPA) Attackon Implementations of the AES Key Expansion. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 343-358. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2587 , pp. 343-358
    • Mangard, S.1
  • 16
    • 79960079027 scopus 로고    scopus 로고
    • CHES 2010. Springer, Heidelberg
    • Mangard, S., Standaert, F.-X. (eds.): CHES 2010. LNCS, vol. 6225. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6225
    • Mangard, S.1    Standaert, F.-X.2
  • 17
    • 72249120150 scopus 로고    scopus 로고
    • All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis
    • ePrint Archive, Report 2009/185
    • McEvoy, R.P., Tunstall, M., Whelan, C., Murphy, C.C., Marnane, W.P.: All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis. Cryptology ePrint Archive, Report 2009/185 (2009), http://eprint.iacr.org/
    • (2009) Cryptology
    • McEvoy, R.P.1    Tunstall, M.2    Whelan, C.3    Murphy, C.C.4    Marnane, W.P.5
  • 18
    • 80053533371 scopus 로고    scopus 로고
    • Extractors against Side-Channel Attacks: Weak or Strong?
    • Preneel, B., Takagi, T. (eds.) CHES 2011. Springer, Heidelberg
    • Medwed, M., Standaert, F.-X.: Extractors against Side-Channel Attacks: Weak or Strong? In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 256-272. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6917 , pp. 256-272
    • Medwed, M.1    Standaert, F.-X.2
  • 19
    • 77953509171 scopus 로고    scopus 로고
    • Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
    • Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. Springer, Heidelberg
    • Medwed, M., Standaert, F.-X., Großschädl, J., Regazzoni, F.: Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 279-296. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6055 , pp. 279-296
    • Medwed, M.1    Standaert, F.-X.2    Großschädl, J.3    Regazzoni, F.4
  • 20
    • 78049331666 scopus 로고    scopus 로고
    • Algebraic Side-Channel Analysis in the Presence of Errors
    • Mangard, Standaert (eds.) [16]
    • Oren, Y., Kirschbaum, M., Popp, T., Wool, A.: Algebraic Side-Channel Analysis in the Presence of Errors. In: Mangard, Standaert (eds.) [16], pp. 428-442
    • LNCS , pp. 428-442
    • Oren, Y.1    Kirschbaum, M.2    Popp, T.3    Wool, A.4
  • 21
    • 67650675583 scopus 로고    scopus 로고
    • A Leakage-Resilient Mode of Operation
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Pietrzak, K.: A Leakage-Resilient Mode of Operation. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 462-482. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 462-482
    • Pietrzak, K.1
  • 23
    • 70350576829 scopus 로고    scopus 로고
    • Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
    • Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
    • Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N.: Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 97-111. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5747 , pp. 97-111
    • Renauld, M.1    Standaert, F.-X.2    Veyrat-Charvillon, N.3
  • 24
    • 78049343104 scopus 로고    scopus 로고
    • Provably Secure Higher-Order Masking of AES
    • Mangard, Standaert (eds.) [16]
    • Rivain, M., Prouff, E.: Provably Secure Higher-Order Masking of AES. In: Mangard, Standaert (eds.) [16], pp. 413-427
    • LNCS , pp. 413-427
    • Rivain, M.1    Prouff, E.2
  • 25
    • 0242571732 scopus 로고    scopus 로고
    • A New Class of Collision Attacks and Its Application to des
    • Johansson, T. (ed.) FSE 2003. Springer, Heidelberg
    • Schramm, K., Wollinger, T., Paar, C.: A New Class of Collision Attacks and Its Application to DES. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 206-222. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2887 , pp. 206-222
    • Schramm, K.1    Wollinger, T.2    Paar, C.3
  • 28
    • 35248825993 scopus 로고    scopus 로고
    • Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology
    • Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. Springer, Heidelberg
    • Tiri, K., Verbauwhede, I.: Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology. In:Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 125-136. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2779 , pp. 125-136
    • Tiri, K.1    Verbauwhede, I.2
  • 29
    • 3042604811 scopus 로고    scopus 로고
    • A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation
    • IEEE Computer Society
    • Tiri, K., Verbauwhede, I.: A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. In: DATE, pp. 246-251. IEEE Computer Society (2004)
    • (2004) DATE , pp. 246-251
    • Tiri, K.1    Verbauwhede, I.2
  • 30
    • 84885047110 scopus 로고    scopus 로고
    • Side Channel Analysis, Fault Injection and Applications - A Computationally Feasible SPA Attack on AES via Optimized Search
    • Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds.) Springer, Heidelberg
    • VanLaven, J., Brehob, M., Compton, K.J.: Side Channel Analysis, Fault Injection and Applications - A Computationally Feasible SPA Attack on AES via Optimized Search. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds.) SEC, pp. 577-588. Springer, Heidelberg (2005)
    • (2005) SEC , pp. 577-588
    • VanLaven, J.1    Brehob, M.2    Compton, K.J.3
  • 31
    • 78650013814 scopus 로고    scopus 로고
    • Practical leakage-resilient pseudorandom generators
    • Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM
    • Yu, Y., Standaert, F.-X., Pereira, O., Yung, M.: Practical leakage-resilient pseudorandom generators. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM Conference on Computer and Communications Security, pp. 141-151. ACM (2010)
    • (2010) ACM Conference on Computer and Communications Security , pp. 141-151
    • Yu, Y.1    Standaert, F.-X.2    Pereira, O.3    Yung, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.