메뉴 건너뛰기




Volumn 7549 LNCS, Issue , 2012, Pages 366-384

Higher-order masking schemes for S-boxes

Author keywords

[No Author keywords available]

Indexed keywords

ARBITRARY ORDER; BLOCK CIPHERS; BOOLEAN CIRCUIT; MASKING SCHEMES; OPTIMAL METHODS; POWER FUNCTIONS; S-BOXES; SECURITY PARAMETERS; SIDE CHANNEL ATTACK;

EID: 84866726757     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-34047-5_21     Document Type: Conference Paper
Times cited : (98)

References (31)
  • 1
    • 3042547883 scopus 로고    scopus 로고
    • A Fast and Secure Implementation of Sflash
    • Desmedt, Y.G. (ed.) PKC 2003. Springer, Heidelberg
    • Akkar, M.-L., Courtois, N., Duteuil, R., Goubin, L.: A Fast and Secure Implementation of Sflash. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 267-278. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2567 , pp. 267-278
    • Akkar, M.-L.1    Courtois, N.2    Duteuil, R.3    Goubin, L.4
  • 2
    • 84943615552 scopus 로고    scopus 로고
    • An Implementation of des and AES, Secure against Some Attacks
    • Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. Springer, Heidelberg
    • Akkar, M.-L., Giraud, C.: An Implementation of DES and AES, Secure against Some Attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 309-318. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2162 , pp. 309-318
    • Akkar, M.-L.1    Giraud, C.2
  • 3
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • AFIPS Press, New York
    • Blakley, G.: Safeguarding cryptographic keys. In: National Comp. Conf., June 1979, vol. 48, pp. 313-317. AFIPS Press, New York (1979)
    • (1979) National Comp. Conf., June 1979 , vol.48 , pp. 313-317
    • Blakley, G.1
  • 4
    • 35048848490 scopus 로고    scopus 로고
    • Provably SecureMasking of AES
    • Handschuh, H., Hasan, M.A. (eds.) SAC 2004. Springer, Heidelberg
    • Blömer, J., Guajardo, J., Krummel, V.: Provably SecureMasking of AES. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 69-83. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3357 , pp. 69-83
    • Blömer, J.1    Guajardo, J.2    Krummel, V.3
  • 5
    • 37149045263 scopus 로고    scopus 로고
    • PRESENT: An Ultra-Lightweight Block Cipher
    • Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
    • Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450-466. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4727 , pp. 450-466
    • Bogdanov, A.1    Knudsen, L.R.2    Leander, G.3    Paar, C.4    Poschmann, A.5    Robshaw, M.J.B.6    Seurin, Y.7    Vikkelsoe, C.8
  • 6
    • 35048818034 scopus 로고    scopus 로고
    • Correlation Power Analysis with a Leakage Model
    • Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
    • Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3156 , pp. 16-29
    • Brier, E.1    Clavier, C.2    Olivier, F.3
  • 7
    • 84957079591 scopus 로고    scopus 로고
    • Towards Sound Approaches to Counteract Power-Analysis Attacks
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398-412. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 398-412
    • Chari, S.1    Jutla, C.S.2    Rao, J.R.3    Rohatgi, P.4
  • 8
    • 38049064396 scopus 로고    scopus 로고
    • Side Channel Cryptanalysis of a Higher Order Masking Scheme
    • Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
    • Coron, J.-S., Prouff, E., Rivain, M.: Side Channel Cryptanalysis of a Higher Order Masking Scheme. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 28-44. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4727 , pp. 28-44
    • Coron, J.-S.1    Prouff, E.2    Rivain, M.3
  • 9
    • 30244458561 scopus 로고
    • The evaluation of polynomials
    • Eve, J.: The evaluation of polynomials. Comm. ACM 6(1), 17-21 (1964)
    • (1964) Comm. ACM , vol.6 , Issue.1 , pp. 17-21
    • Eve, J.1
  • 10
    • 77954640094 scopus 로고    scopus 로고
    • Protecting Circuits from Leakage: The Computationally-Bounded and Noisy Cases
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Faust, S., Rabin, T., Reyzin, L., Tromer, E., Vaikuntanathan, V.: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 135-156. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 135-156
    • Faust, S.1    Rabin, T.2    Reyzin, L.3    Tromer, E.4    Vaikuntanathan, V.5
  • 11
    • 0003508568 scopus 로고
    • FIPS PUB 46. National Bureau of Standards January
    • FIPS PUB 46. The Data Encryption Standard. National Bureau of Standards (January 1977)
    • (1977) The Data Encryption Standard
  • 12
    • 80053472888 scopus 로고    scopus 로고
    • Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings
    • Preneel, B., Takagi, T. (eds.) CHES 2011. Springer, Heidelberg
    • Genelle, L., Prouff, E., Quisquater, M.: Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 240-255. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6917 , pp. 240-255
    • Genelle, L.1    Prouff, E.2    Quisquater, M.3
  • 13
    • 84949520149 scopus 로고    scopus 로고
    • DES and Differential Power Analysis
    • Koç, Ç.K., Paar, C. (eds.) CHES 1999. Springer, Heidelberg
    • Goubin, L., Patarin, J.: DES and Differential Power Analysis. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 158-172. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1717 , pp. 158-172
    • Goubin, L.1    Patarin, J.2
  • 14
    • 35248830337 scopus 로고    scopus 로고
    • Private Circuits: Securing Hardware against Probing Attacks
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Ishai, Y., Sahai, A.,Wagner, D.: Private Circuits: Securing Hardware against Probing Attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463-481. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 463-481
    • Ishai, Y.1    Sahai, A.2    Wagner, D.3
  • 15
    • 80053483211 scopus 로고    scopus 로고
    • A Fast and Provably Secure Higher-Order Masking of AES S-Box
    • Preneel, B., Takagi, T. (eds.) CHES 2011. Springer, Heidelberg
    • Kim, H., Hong, S., Lim, J.: A Fast and Provably Secure Higher-Order Masking of AES S-Box. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 95-107. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6917 , pp. 95-107
    • Kim, H.1    Hong, S.2    Lim, J.3
  • 17
    • 0012096216 scopus 로고
    • Evaluation of polynomials by computers
    • Knuth, D.E.: Evaluation of polynomials by computers. Comm. ACM 5(12), 595-599 (1962)
    • (1962) Comm. ACM , vol.5 , Issue.12 , pp. 595-599
    • Knuth, D.E.1
  • 18
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 19
    • 24144459808 scopus 로고    scopus 로고
    • Side-Channel Leakage of Masked CMOS Gates
    • Menezes, A. (ed.) CT-RSA 2005. Springer, Heidelberg
    • Mangard, S., Popp, T., Gammel, B.M.: Side-Channel Leakage of Masked CMOS Gates. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 351-365. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3376 , pp. 351-365
    • Mangard, S.1    Popp, T.2    Gammel, B.M.3
  • 20
    • 27244451021 scopus 로고    scopus 로고
    • Successfully Attacking Masked AES Hardware Implementations
    • Rao, J.R., Sunar, B. (eds.) CHES 2005. Springer, Heidelberg
    • Mangard, S., Pramstaller, N., Oswald, E.: Successfully Attacking Masked AES Hardware Implementations. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 157-171. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3659 , pp. 157-171
    • Mangard, S.1    Pramstaller, N.2    Oswald, E.3
  • 21
    • 84974679353 scopus 로고    scopus 로고
    • Securing the AES Finalists Against Power Analysis Attacks
    • Schneier, B. (ed.) FSE 2000. Springer, Heidelberg
    • Messerges, T.S.: Securing the AES Finalists Against Power Analysis Attacks. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 150-164. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.1978 , pp. 150-164
    • Messerges, T.S.1
  • 22
    • 68549099555 scopus 로고    scopus 로고
    • Using Second-Order Power Analysis to Attack DPA Resistant Software
    • Paar, C., Koç, Ç.K. (eds.) CHES 2000. Springer, Heidelberg
    • Messerges, T.S.: Using Second-Order Power Analysis to Attack DPA Resistant Software. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 238-251. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1965 , pp. 238-251
    • Messerges, T.S.1
  • 23
    • 67049132511 scopus 로고    scopus 로고
    • Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches
    • Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. Springer, Heidelberg
    • Nikova, S., Rijmen, V., Schläffer, M.: Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 218-234. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5461 , pp. 218-234
    • Nikova, S.1    Rijmen, V.2    Schläffer, M.3
  • 24
    • 38049043381 scopus 로고    scopus 로고
    • Evaluation of the Masked Logic Style MDPL on a Prototype Chip
    • Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
    • Popp, T., Kirschbaum, M., Zefferer, T., Mangard, S.: Evaluation of the Masked Logic Style MDPL on a Prototype Chip. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 81-94. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4727 , pp. 81-94
    • Popp, T.1    Kirschbaum, M.2    Zefferer, T.3    Mangard, S.4
  • 25
    • 38549120276 scopus 로고    scopus 로고
    • A Generic Method for Secure SBox Implementation
    • Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. Springer, Heidelberg
    • Prouff, E., Rivain, M.: A Generic Method for Secure SBox Implementation. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol. 4867, pp. 227-244. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4867 , pp. 227-244
    • Prouff, E.1    Rivain, M.2
  • 26
    • 50249140648 scopus 로고    scopus 로고
    • Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
    • Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
    • Rivain, M., Dottax, E., Prouff, E.: Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 127-143. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5086 , pp. 127-143
    • Rivain, M.1    Dottax, E.2    Prouff, E.3
  • 27
    • 78049343104 scopus 로고    scopus 로고
    • Provably Secure Higher-Order Masking of AES
    • Mangard, S., Standaert, F.-X. (eds.) CHES 2010. Springer, Heidelberg
    • Rivain, M., Prouff, E.: Provably Secure Higher-Order Masking of AES. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 413-427. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6225 , pp. 413-427
    • Rivain, M.1    Prouff, E.2
  • 28
    • 84946832086 scopus 로고    scopus 로고
    • A Compact Rijndael Hardware Architecture with S-Box Optimization
    • Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
    • Satoh, A., Morioka, S., Takano, K., Munetoh, S.: A Compact Rijndael Hardware Architecture with S-Box Optimization. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 239-254. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 239-254
    • Satoh, A.1    Morioka, S.2    Takano, K.3    Munetoh, S.4
  • 29
    • 33745652931 scopus 로고    scopus 로고
    • Higher Order Masking of the AES
    • Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
    • Schramm, K., Paar, C.: Higher Order Masking of the AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 208-225. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3860 , pp. 208-225
    • Schramm, K.1    Paar, C.2
  • 30
    • 0018545449 scopus 로고
    • How to Share a Secret
    • Shamir, A.: How to Share a Secret. Commun. ACM 22(11), 612-613 (1979)
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 31
    • 0003555072 scopus 로고
    • Efficient and Optimal Exponentiation in Finite Fields
    • von zur Gathen, J.: Efficient and Optimal Exponentiation in Finite Fields. Computational Complexity 1, 360-394 (1991)
    • (1991) Computational Complexity , vol.1 , pp. 360-394
    • Von Zur Gathen, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.