메뉴 건너뛰기




Volumn , Issue , 2006, Pages 187-206

Embedded cryptography: Side channel attacks

Author keywords

DPA; internal collisions; side channel attacks; SPA; template attacks

Indexed keywords


EID: 84859020313     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/3-540-28428-1_11     Document Type: Chapter
Times cited : (9)

References (37)
  • 5
    • 68549105908 scopus 로고    scopus 로고
    • On boolean and arithmetic masking against differential power analysis
    • In Ç. K. Koç and C. Paar, editors, Springer-Verlag
    • C. Clavier and J.-S. Coron. On Boolean and Arithmetic Masking against Differential Power Analysis. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2000, volume LNCS 1965, pages 231-237. Springer-Verlag, 2000.
    • (2000) Cryptographic Hardware and Embedded Systems-CHES 2000, Volume LNCS 1965 , pp. 231-237
    • Clavier, C.1    Coron, J.-S.2
  • 6
    • 68549099548 scopus 로고    scopus 로고
    • Differential power analysis in the presence of hardware countermeasures
    • In Ç. K. Koç and C. Paar, editors,Springer-Verlag
    • C. Clavier, J.S. Coron, and N. Dabbous. Differential Power Analysis in the Presence of Hardware Countermeasures. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2000, volume LNCS 1965, pages 252-263. Springer-Verlag, 2000.
    • (2000) Cryptographic Hardware and Embedded Systems-CHES 2000, Volume LNCS 1965 , pp. 252-263
    • Clavier, C.1    Coron, J.S.2    Dabbous, N.3
  • 9
    • 35248883440 scopus 로고    scopus 로고
    • A new algorithm for switching from arithmetic to boolean masking
    • In Ç. K. Koç and C. Paar, editors,Springer-Verlag
    • J.-S. Coron and A. Tchulkine. A New Algorithm for Switching from Arithmetic to Boolean Masking. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2003, pages 89-97. Springer-Verlag, 2003.
    • (2003) Cryptographic Hardware and Embedded Systems-CHES 2003 , pp. 89-97
    • Coron, J.-S.1    Tchulkine, A.2
  • 12
    • 0348175848 scopus 로고    scopus 로고
    • RIPEMD with two-round compress function is not collision-free
    • H. Dobbertin. RIPEMD with two-round compress function is not collision-free. Journal of Cryptology, 1051-68, 1997.
    • (1997) Journal of Cryptology , vol.10 , pp. 51-68
    • Dobbertin, H.1
  • 13
  • 14
    • 84944879586 scopus 로고    scopus 로고
    • A sound method for switching between boolean and arithmetic masking
    • In Ç. K. Koç and C. Paar, editors, Springer-Verlag
    • L. Goubin. A Sound Method for Switching between Boolean and Arithmetic Masking. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2001, pages 3-15. Springer-Verlag, 2001.
    • (2001) Cryptographic Hardware and Embedded Systems-CHES 2001 , pp. 3-15
    • Goubin, L.1
  • 15
    • 84949520149 scopus 로고    scopus 로고
    • DES and differential power analysis the duplication method
    • In Ç. K. Koç and C. Paar, editors,Springer-Verlag
    • L. Goubin and J. Patarin. DES and differential power analysis the duplication method. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 1999, volume LNCS 1717, pages 158-172. Springer-Verlag, 1999.
    • (1999) Cryptographic Hardware and Embedded Systems-CHES 1999, Volume LNCS 1717 , pp. 158-172
    • Goubin, L.1    Patarin, J.2
  • 16
    • 84889770208 scopus 로고    scopus 로고
    • Technical Information-GSM System Security Study, 1998
    • Technical Information-GSM System Security Study, 1998. jya.com/ gsm061088.htm.
  • 20
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems
    • Springer-Verlag
    • P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Advances in Cryptology-CRYPTO '96, volume LNCS 1666, pages 104-113. Springer-Verlag, 1996.
    • (1996) Advances in Cryptology-CRYPTO '96, Volume LNCS 1666 , pp. 104-113
    • Kocher, P.1
  • 21
    • 27244440754 scopus 로고    scopus 로고
    • DPA on n-bit sized Boolean and Arithmetic Operations and its Application to IDEA, RC6 and the HMACConstruction
    • Springer-Verlag, August
    • K. Lemke, K. Schramm, and C. Paar. DPA on n-bit sized Boolean and Arithmetic Operations and its Application to IDEA, RC6 and the HMACConstruction. In Cryptographic Hardware and Embedded Systems-CHES '04. Springer-Verlag, August 2004.
    • (2004) Cryptographic Hardware and Embedded Systems-CHES '04
    • Lemke, K.1    Schramm, K.2    Paar, C.3
  • 23
    • 68549099555 scopus 로고    scopus 로고
    • Using second-order power analysis to attack dpa resistant software
    • In Ç. K. Koç and C. Paar, editors,Springer-Verlag
    • T. S. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2000, volume LNCS 1965, pages 238-251. Springer-Verlag, 2000.
    • (2000) Cryptographic Hardware and Embedded Systems-CHES 2000, Volume LNCS 1965 , pp. 238-251
    • Messerges, T.S.1
  • 24
    • 68549126765 scopus 로고    scopus 로고
    • Smartly analyzing the simplicity and the power of simple power analysis on smart cards
    • In Ç. K. Koç and C. Paar, editors, Springer-Verlag
    • R. Mayer-Sommer. Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smart Cards. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2000, volume LNCS 1965, pages 78-92. Springer-Verlag, 2000.
    • (2000) Cryptographic Hardware and Embedded Systems-CHES 2000, Volume LNCS 1965 , pp. 78-92
    • Mayer-Sommer, R.1
  • 25
    • 0003629991 scopus 로고
    • NIST FIPS PUB 180-1.National Bureau of Standards, U.S. Department of Commerce, Washington D.C., April
    • NIST FIPS PUB 180-1. Secure Hash Standard. Federal Information Processing Standards, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., April 1995.
    • (1995) Secure Hash Standard. Federal Information Processing Standards
  • 27
    • 68549092451 scopus 로고    scopus 로고
    • A timing attack against rsa with the chinese remainder theorem
    • In C.K. Koç and C. Paar, editors,Springer-Verlag
    • Werner Schindler. A timing attack against rsa with the chinese remainder theorem. In C.K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2000, volume 1965 of LNCS, pages 109-124. Springer-Verlag, 2000.
    • (2000) Cryptographic Hardware and Embedded Systems-CHES 2000, Volume 1965 of LNCS , pp. 109-124
    • Schindler, W.1
  • 30
    • 18844409918 scopus 로고    scopus 로고
    • UCL Crypto Group Technical Report Series CG-2001/3, Universiteé catholique de Louvain (UCL), Place du Levant, 3 B-1348 Louvain-la-Neuve, Belgium
    • Werner Schindler, Francois Koene, and Jean-Jacques Quisquater. Unleashing the full power of timing attack. UCL Crypto Group Technical Report Series CG-2001/3, Universiteé catholique de Louvain (UCL), Place du Levant, 3 B-1348 Louvain-la-Neuve, Belgium, 2001.
    • (2001) Unleashing the Full Power of Timing Attack
    • Schindler, W.1    Koene, F.2    Quisquater, J.-J.3
  • 32
    • 33645591077 scopus 로고    scopus 로고
    • More detail for a combined timing and power attack against implementations of rsa
    • In K. G. Paterson, editor,Springer-Verlag
    • Werner Schindler and Colin D. Walter. More detail for a combined timing and power attack against implementations of rsa. In K. G. Paterson, editor, Cryptography and Coding 2003, volume 2898 of LNCS, pages 245-263. Springer-Verlag, 2003.
    • (2003) Cryptography and Coding 2003, Volume 2898 of LNCS , pp. 245-263
    • Schindler, W.1    Walter, C.D.2
  • 37
    • 35048894566 scopus 로고    scopus 로고
    • Partial collision search by side channel analysis
    • January. Horst Görtz Institute, Bochum, Germany
    • A. Wiemers. Partial Collision Search by Side Channel Analysis. Presentation at the Workshop Smartcards and Side Channel Attacks, January 2003. Horst Görtz Institute, Bochum, Germany.
    • (2003) Workshop Smartcards and Side Channel Attacks
    • Wiemers, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.