메뉴 건너뛰기




Volumn 7771 LNCS, Issue , 2013, Pages 123-140

Efficient removal of random delays from embedded software implementations using hidden Markov models

Author keywords

[No Author keywords available]

Indexed keywords

ATMEL MICROCONTROLLERS; CRYPTANALYSIS TOOLS; CRYPTOGRAPHIC IMPLEMENTATION; DIFFERENT ATTACKS; RANDOM DELAY INSERTIONS; SIDE CHANNEL ATTACK; SOFTWARE IMPLEMENTATION; STATISTICAL DISTRIBUTION;

EID: 84875113626     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-37288-9_9     Document Type: Conference Paper
Times cited : (37)

References (29)
  • 1
    • 84875112494 scopus 로고    scopus 로고
    • http://point-at-infinity.org/avraes/
  • 2
    • 35048818034 scopus 로고    scopus 로고
    • Correlation Power Analysis with a Leakage Model
    • Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
    • Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3156 , pp. 16-29
    • Brier, E.1    Clavier, C.2    Olivier, F.3
  • 3
    • 84957079591 scopus 로고    scopus 로고
    • Towards Sound Approaches to Counteract Power-Analysis Attacks
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398-412. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 398-412
    • Chari, S.1    Jutla, C.S.2    Rao, J.R.3    Rohatgi, P.4
  • 4
    • 35248899532 scopus 로고    scopus 로고
    • Template Attacks
    • Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
    • Chari, S., Rao, J.R., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13-28. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2523 , pp. 13-28
    • Chari, S.1    Rao, J.R.2    Rohatgi, P.3
  • 5
    • 68549099548 scopus 로고    scopus 로고
    • Differential Power Analysis in the Presence of Hardware Countermeasures
    • Cryptographic Hardware and Embedded Systems - CHES 2000 Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings
    • Clavier, C., Coron, J.-S., Dabbous, N.: Differential Power Analysis in the Presence of Hardware Countermeasures. In: Koç, Ç.K., Paar, C. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252-263. Springer, Heidelberg (2000) (Pubitemid 33213973)
    • (2000) LECTURE NOTES in COMPUTER SCIENCE , Issue.1965 , pp. 252-263
    • Clavier, C.1    Coron, J.-S.2    Dabbous, N.3
  • 6
    • 70350589242 scopus 로고    scopus 로고
    • An Efficient Method for Random Delay Generation in Embedded Software
    • Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
    • Coron, J.-S., Kizhvatov, I.: An Efficient Method for Random Delay Generation in Embedded Software. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 156-170. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5747 , pp. 156-170
    • Coron, J.-S.1    Kizhvatov, I.2
  • 7
    • 78049335572 scopus 로고    scopus 로고
    • Analysis and Improvement of the Random Delay Countermeasure of CHES 2009
    • Mangard, S., Standaert, F.-X. (eds.) CHES 2010. Springer, Heidelberg
    • Coron, J.-S., Kizhvatov, I.: Analysis and Improvement of the Random Delay Countermeasure of CHES 2009. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 95-109. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6225 , pp. 95-109
    • Coron, J.-S.1    Kizhvatov, I.2
  • 8
    • 26444614207 scopus 로고    scopus 로고
    • SCARE of the DES
    • Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
    • Daudigny, R., Ledig, H., Muller, F., Valette, F.: SCARE of the DES. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 393-406. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3531 , pp. 393-406
    • Daudigny, R.1    Ledig, H.2    Muller, F.3    Valette, F.4
  • 11
    • 79958785692 scopus 로고    scopus 로고
    • Formal Framework for the Evaluation of Waveform Resynchronization Algorithms
    • Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. Springer, Heidelberg
    • Guilley, S., Khalfallah, K., Lomne, V., Danger, J.-L.: Formal Framework for the Evaluation of Waveform Resynchronization Algorithms. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 100-115. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6633 , pp. 100-115
    • Guilley, S.1    Khalfallah, K.2    Lomne, V.3    Danger, J.-L.4
  • 12
    • 77955916818 scopus 로고    scopus 로고
    • Defeating Any Secret Cryptography with SCARE Attacks
    • Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. Springer, Heidelberg
    • Guilley, S., Sauvage, L., Micolod, J., Rȩal, D., Valette, F.: Defeating Any Secret Cryptography with SCARE Attacks. In: Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. LNCS, vol. 6212, pp. 273-293. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6212 , pp. 273-293
    • Guilley, S.1    Sauvage, L.2    Micolod, J.3    Rȩal, D.4    Valette, F.5
  • 14
    • 84948778220 scopus 로고    scopus 로고
    • Instruction Stream Mutation for Non- Deterministic Processors
    • IEEE
    • Irwin, J., Page, D., Smart, N.P.: Instruction Stream Mutation for Non- Deterministic Processors. In: ASAP, pp. 286-295. IEEE (2002)
    • (2002) ASAP , pp. 286-295
    • Irwin, J.1    Page, D.2    Smart, N.P.3
  • 16
    • 35048819488 scopus 로고    scopus 로고
    • Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness
    • Okamoto, T. (ed.) CT-RSA 2004. Springer, Heidelberg
    • Mangard, S.: Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 222-235. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2964 , pp. 222-235
    • Mangard, S.1
  • 18
    • 79959430513 scopus 로고    scopus 로고
    • One for All - All for One: Unifying Standard DPA Attacks
    • Mangard, S., Oswald, E., Standaert, F.-X.: One for All - All for One: Unifying Standard DPA Attacks. IET Information Security 5(2), 100-110 (2011)
    • (2011) IET Information Security , vol.5 , Issue.2 , pp. 100-110
    • Mangard, S.1    Oswald, E.2    Standaert, F.-X.3
  • 19
    • 34548823012 scopus 로고    scopus 로고
    • DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure
    • IEEE
    • Nagashima, S., Homma, N., Imai, Y., Aoki, T., Satoh, A.: DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure. In: ISCAS, pp. 1807-1810. IEEE (2007)
    • (2007) ISCAS , pp. 1807-1810
    • Nagashima, S.1    Homma, N.2    Imai, Y.3    Aoki, T.4    Satoh, A.5
  • 20
    • 52949150830 scopus 로고    scopus 로고
    • SCARE of an Unknown Hardware Feistel Implementation
    • Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. Springer, Heidelberg
    • Rȩal, D., Dubois, V., Guilloux, A.-M., Valette, F., Drissi, M.: SCARE of an Unknown Hardware Feistel Implementation. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 218-227. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5189 , pp. 218-227
    • Rȩal, D.1    Dubois, V.2    Guilloux, A.-M.3    Valette, F.4    Drissi, M.5
  • 21
    • 27244432445 scopus 로고    scopus 로고
    • A stochastic model for differential side channel cryptanalysis
    • Cryptographic Hardware and Embedded Systems - CHES 2005: 7th International Workshop. Proceedings
    • Schindler, W., Lemke, K., Paar, C.: A Stochastic Model for Differential Side Channel Cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30-46. Springer, Heidelberg (2005) (Pubitemid 41520697)
    • (2005) Lecture Notes in Computer Science , vol.3659 , pp. 30-46
    • Schindler, W.1    Lemke, K.2    Paar, C.3
  • 22
    • 51049103841 scopus 로고    scopus 로고
    • Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages
    • Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
    • Standaert, F.-X., Archambeau, C.: Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 411-425. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5154 , pp. 411-425
    • Standaert, F.-X.1    Archambeau, C.2
  • 23
    • 67650694228 scopus 로고    scopus 로고
    • A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Standaert, F.-X., Malkin, T.G., Yung, M.: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443-461. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 443-461
    • Standaert, F.-X.1    Malkin, T.G.2    Yung, M.3
  • 24
    • 78650838653 scopus 로고    scopus 로고
    • The World Is Not Enough: Another Look on Second- Order DPA
    • Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
    • Standaert, F.-X., Veyrat-Charvillon, N., Oswald, E., Gierlichs, B., Medwed, M., Kasper, M., Mangard, S.: The World Is Not Enough: Another Look on Second- Order DPA. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 112-129. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6477 , pp. 112-129
    • Standaert, F.-X.1    Veyrat-Charvillon, N.2    Oswald, E.3    Gierlichs, B.4    Medwed, M.5    Kasper, M.6    Mangard, S.7
  • 25
    • 84864665770 scopus 로고    scopus 로고
    • An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software
    • Kim, H. (ed.) ICISC 2011. Springer, Heidelberg
    • Strobel, D., Paar, C.: An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 48-60. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7259 , pp. 48-60
    • Strobel, D.1    Paar, C.2
  • 28
    • 79951793524 scopus 로고    scopus 로고
    • Improving Differential Power Analysis by Elastic Alignment
    • Kiayias, A. (ed.) CT-RSA 2011. Springer, Heidelberg
    • van Woudenberg, J.G.J., Witteman, M.F., Bakker, B.: Improving Differential Power Analysis by Elastic Alignment. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 104-119. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6558 , pp. 104-119
    • Van Woudenberg, J.G.J.1    Witteman, M.F.2    Bakker, B.3
  • 29
    • 84875107824 scopus 로고    scopus 로고
    • CHES 2003
    • Springer, Heidelberg
    • Walter, C.D., Koç, Ç.K., Paar, C. (eds.): CHES 2003. LNCS, vol. 2779. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2779
    • Walter, C.D.1    Koç, Ç.K.2    Paar, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.