메뉴 건너뛰기




Volumn 1294, Issue , 1997, Pages 513-525

Differential fault analysis of secret key cryptosystems

Author keywords

[No Author keywords available]

Indexed keywords

HARDWARE; PUBLIC KEY CRYPTOGRAPHY; RANDOM ACCESS STORAGE; RECONFIGURABLE HARDWARE; SECURITY OF DATA; SIDE CHANNEL ATTACK;

EID: 84958641478     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0052259     Document Type: Conference Paper
Times cited : (1291)

References (21)
  • 2
    • 0000694402 scopus 로고    scopus 로고
    • Low Cost Attacks on Tamper Resistant Devices, proceedings of the
    • [2] Ross Anderson, Markus Kuhn, Low Cost Attacks on Tamper Resistant Devices, proceedings of the 1997 Security Protocols Workshop, Paris, April 7-9, 1997.
    • (1997) Security Protocols Workshop
    • Anderson, R.1    Kuhn, M.2
  • 3
    • 0028494723 scopus 로고
    • New Types of Cryptanalytic Attacks Using Related Keys
    • [3] Eli Biham, New Types of Cryptanalytic Attacks Using Related Keys, Journal of Cryptology, Vol. 7, No. 4, pp. 229-246, 1994.
    • (1994) Journal of Cryptology , vol.7 , Issue.4 , pp. 229-246
    • Biham, E.1
  • 4
    • 0003508574 scopus 로고
    • Differential Cryptanalysis of the Data Encryption Standard
    • [4] Eli Biham, Adi Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
    • (1993) Springer-Verlag
    • Biham, E.1    Shamir, A.2
  • 5
    • 84957355967 scopus 로고    scopus 로고
    • On the Importance of Checking Cryptographic Protocols for Faults, Lecture Notes in Computer Science
    • [5] Dan Boneh, Richard A. Demillo, Richard J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT'97, pp. 37-51, 1997.
    • (1997) Advances in Cryptology, Proceedings of EUROCRYPT'97 , pp. 37-51
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 6
    • 84985833497 scopus 로고
    • LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications, Lecture Notes in Computer Science
    • [6] Lawrence Brown, Josef Pieprzyk, Jennifer Seberry, LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of AUSCRYPT'90, pp. 229-236, 1990.
    • (1990) Advances in Cryptology, Proceedings of AUSCRYPT'90 , pp. 229-236
    • Brown, L.1    Pieprzyk, J.2    Seberry, J.3
  • 7
    • 67650338267 scopus 로고    scopus 로고
    • Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES, Lecture Notes in Computer Science
    • [7] John Kelsey, Bruce Schneier, David Wagner, Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO'96, pp. 237-251, 1996.
    • (1996) Advances in Cryptology, Proceedings of CRYPTO'96 , pp. 237-251
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 8
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attack's on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Lecture Notes in Computer Science
    • [8] Paul C. Kocher, Timing Attack's on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO'96, pp. 104-113, 1996.
    • (1996) Advances in Cryptology, Proceedings of CRYPTO'96 , pp. 104-113
    • Kocher, P.C.1
  • 11
    • 84969359527 scopus 로고    scopus 로고
    • Potential Flaw Seen in Cash Card Security
    • [11] John Markoff, Potential Flaw Seen in Cash Card Security, New York Times, September 26, 1996.
    • (1996) New York Times , pp. 26
    • Markoff, J.1
  • 12
    • 85025704284 scopus 로고
    • Linear Cryptanalysis Method for DES Cipher, Lecture Notes in Computer Science
    • [12] Mitsuru Matsui, Linear Cryptanalysis Method for DES Cipher, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT'93, pp. 386-397, 1993.
    • (1993) Advances in Cryptology, Proceedings of EUROCRYPT'93 , pp. 386-397
    • Matsui, M.1
  • 13
    • 0005270932 scopus 로고
    • Fast Software Encryption Functions, LectureNotes in Computer Science
    • [13] Ralph C. Merkle, Fast Software Encryption Functions, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO'90, pp. 476-501, 1990.
    • (1990) Advances in Cryptology, Proceedings of CRYPTO'90 , pp. 476-501
    • Merkle, R.C.1
  • 14
    • 84969356079 scopus 로고
    • FEAL-N specifications, technical note
    • [14] Shoji Miyaguchi, FEAL-N specifications, technical note, NTT, 1989.
    • (1989) NTT
    • Miyaguchi, S.1
  • 17
    • 34248682000 scopus 로고
    • National Bureau of Standards
    • Data Encryption Standard, U.S. Department of Commerce
    • [17] National Bureau of Standards, Data Encryption Standard, U.S. Department of Commerce, FIPS pub. 46, January 1977.
    • (1977) FIPS Pub , pp. 46
  • 18
    • 84959032968 scopus 로고
    • Lecture Notes in Computer Science
    • Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds
    • [18] Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan Buelens, Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO'93, pp. 212-223, 1993.
    • (1993) Advances in Cryptology, Proceedings of CRYPTO'93 , pp. 212-223
    • Preneel, B.1    Nuttin, M.2    Rijmen, V.3    Buelens, J.4
  • 19
    • 84948990100 scopus 로고
    • The RC5 Encryption Algorithm, proceedings of Fast Software Encryption, Leuven
    • [19] Ronald L. Rivest, The RC5 Encryption Algorithm, proceedings of Fast Software Encryption, Leuven, Lecture Notes in Computer Science, pp. 86-96, 1994.
    • (1994) Lecture Notes in Computer Science , pp. 86-96
    • Rivest, R.L.1
  • 20
    • 0001254670 scopus 로고
    • Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish), proceedings of Fast Software Encryption
    • [20] Bruce Schneier, Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish), proceedings of Fast Software Encryption, Cambridge, Lecture Notes in Computer Science, pp. 191-204, 1993.
    • (1993) Cambridge, Lecture Notes in Computer Science , pp. 191-204
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.