메뉴 건너뛰기




Volumn 1717, Issue , 1999, Pages 303-315

Probing attacks on tamper-resistant devices

Author keywords

[No Author keywords available]

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY;

EID: 84949517809     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48059-5_26     Document Type: Conference Paper
Times cited : (35)

References (23)
  • 1
  • 2
    • 84958641478 scopus 로고    scopus 로고
    • Differential Fault Analysis of Secret Key Cryptosystems
    • Springer-Verla
    • E. Biham, A. Shamir. Differential Fault Analysis of Secret Key Cryptosystems. In Advances in Cryptology - Crypto'97, LNCS 1294, pages 513-525. Springer-Verlag, 1997.
    • (1997) Advances in Cryptology - Crypto'97, LNCS 1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 4
    • 84949514931 scopus 로고    scopus 로고
    • FIPS PUB 186, February 1, 1993, Digital Signature Standard
    • FIPS PUB 186, February 1, 1993, Digital Signature Standard.
  • 6
    • 0001820140 scopus 로고
    • Cryptography and computer privacy
    • H. Feistel. Cryptography and computer privacy. In Scientific american, 1973.
    • (1973) Scientific American
    • Feistel, H.1
  • 10
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Springer-Verla
    • Paul C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Advances in Cryptology - Crypto 96, LNCS. Springer-Verlag, 1996.
    • (1996) Advances in Cryptology - Crypto 96, LNCS
    • Kocher, P.C.1
  • 11
    • 84949508672 scopus 로고    scopus 로고
    • P. Kocher, J. Jaffe, B. Jun. Introduction to Differential Power Analysis and Related Attacks. Available from http://www.cryptography.com/dpa/technical/.
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 13
    • 34248682000 scopus 로고
    • National Bureau of Standards. Data Encryption Standard
    • U.S. National Bureau of Standards. Data Encryption Standard, Federal Information Processing Standard Publication 46-2, 1977.
    • (1977) Federal Information Processing Standard Publication , pp. 46-52
  • 14
    • 84956855021 scopus 로고    scopus 로고
    • Evaluating Differential Fault Analysis of Unknown Cryptosystems
    • Springer-Verla
    • P. Paillier. Evaluating Differential Fault Analysis of Unknown Cryptosystems. In Public Key Cryptography - PKC'99, LNCS 1560. Springer-Verlag, 1999.
    • (1999) Public Key Cryptography - PKC'99, LNCS 1560
    • Paillier, P.1
  • 16
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystem
    • R. L. Rivest, A. Shamir, L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystem. In Communications of the ACM, vol. 21, 1978.
    • (1978) Communications of the ACM , vol.21
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 17
    • 84949516152 scopus 로고    scopus 로고
    • B. Schneier et al. Side-Channel Attacks. To appear In Cardis 98 - LNCS. Springer-Verlag, 1998.
    • Schneier, B.1
  • 18
    • 84947918919 scopus 로고    scopus 로고
    • New results in linear cryptanalysis of RC5
    • Springer-Verlag, Springer-Verla
    • A. A. Selcuk. New results in linear cryptanalysis of RC5. In Fast Software Encryption 5 - LNCS 1372. pages 1-16, Springer-Verlag, 1998. Springer-Verlag, 1998.
    • (1998) Fast Software Encryption 5 - LNCS 1372 , pp. 1-16
    • Selcuk, A.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.