메뉴 건너뛰기




Volumn , Issue , 2013, Pages 748-752

A power analysis on SMS4 using the chosen plaintext method

Author keywords

Bit model; Chosen plaintext; Hamming distance model; Power analysis; SMS4

Indexed keywords

CRYPTOGRAPHIC ALGORITHMS; HAMMING DISTANCE MODELS; LOCAL AREAS; PLAINTEXT; POWER ANALYSIS; POWER MODEL; RANDOM DIFFUSION; SMS4;

EID: 84900566834     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIS.2013.163     Document Type: Conference Paper
Times cited : (13)

References (8)
  • 1
    • 84900645407 scopus 로고    scopus 로고
    • Office of State Commercial Cipher Administration. SMS4 cipher for WLAN products [EB/ OL] / Up-File/ 200621016423197990.pdf, 2006
    • Office of State Commercial Cipher Administration. SMS4 cipher for WLAN products [EB/ OL]. http: / / www. oscca. gov. cn/ Up-File/ 200621016423197990. pdf, 2006.
  • 4
    • 84900605619 scopus 로고    scopus 로고
    • Research on differential power analysis attack on sms4 algorithm
    • Xuefei Bai,Li Guo,Yanhua Xu,Zhiyuan Li."Research on Differential power Analysis Attack on SMS4 Algorithm".In Journal of Chinese Computer Systems.Vol 30,NO.3.2003.3.
    • (2003) Journal of Chinese Computer Systems , vol.30 , Issue.3 , pp. 3
    • Bai, X.1    Guo, L.2    Xu, Y.3    Li, Z.4
  • 5
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges,T.S,Dabbish.,"Examining smart-card security under the threat of power analysis attacks".IEEE Transactions on Computers,2002 Vol 51.
    • (2002) IEEE Transactions on Computers , vol.51
    • Messerges, T.1    Dabbish, S.2
  • 6
    • 24744441044 scopus 로고    scopus 로고
    • Correlation power analysis with a leakage model
    • E. Brier, C. Clavier, and F. Olivier, "Correlation power analysis with a leakage model," CHES 2004. LNCS, vol. 3156,pp. 125-134, 2004.
    • (2004) CHES 2004. LNCS , vol.3156 , pp. 125-134
    • Brier, E.1    Clavier, C.2    Olivier, F.3
  • 7
    • 84949954262 scopus 로고    scopus 로고
    • DPA countermeasure based on the masking method
    • K Itoh, M Takenaka, N Torn, "DPA Countermeasure Based on the Masking Method " ICIC 2001 LNCS 288.2002.440-456.
    • (2002) ICIC 2001 LNCS , vol.288 , pp. 440-456
    • Itoh, K.1    Takenaka, M.2    Torn, N.3
  • 8
    • 84900576760 scopus 로고    scopus 로고
    • Prevention against differential power analysis attacks base on masking
    • Wenjin Zhou"Prevention against differential power analysis attacks base on masking".Computer Applications.vol 25,NO.12.2005.11.
    • (2005) Computer Applications , vol.25 , Issue.12 , pp. 11
    • Zhou, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.