메뉴 건너뛰기




Volumn 4377 LNCS, Issue , 2007, Pages 243-256

Template attacks on masking—resistance is futile

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84979240258     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11967668_16     Document Type: Conference Paper
Times cited : (103)

References (12)
  • 1
    • 0242571734 scopus 로고    scopus 로고
    • A Generic Protection against High-Order Differential Power Analysis
    • Thomas Johansson, editor, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, of Lecture Notes in Computer Science, Springer
    • Mehdi-Laurent Akkar and Louis Goubin. A Generic Protection against High-Order Differential Power Analysis. In Thomas Johansson, editor, Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, volume 2887 of Lecture Notes in Computer Science, pages 192–205. Springer, 2003.
    • (2003) Fast Software Encryption, 10Th International Workshop , vol.2887 , pp. 192-205
    • Akkar, M.-L.1    Goubin, L.2
  • 2
    • 35248896294 scopus 로고    scopus 로고
    • Multi-channel Attacks
    • Colin D. Walter, ÇetinKayaKoç, and Christof Paar, Cologne, Germany, September 8-10, 2003, Proceedings, volume 2779 of Lecture Notes in Computer Science, Springer
    • Dakshi Agrawal, Josyula R. Rao, and Pankaj Rohatgi. Multi-channel Attacks. In Colin D. Walter, ÇetinKayaKoç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems – CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings, volume 2779 of Lecture Notes in Computer Science, pages 2–16. Springer, 2003.
    • (2003) Cryptographic Hardware and Embedded Systems – CHES 2003, 5Th International Workshop , pp. 2-16
    • Agrawal, D.1    Rao, J.R.2    Rohatgi, P.3
  • 3
    • 27244458972 scopus 로고    scopus 로고
    • Templates as Master Keys
    • Josyula R. Rao and Berk Sunar, editors, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science, Springer
    • Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, and Kai Schramm. Templates as Master Keys. In Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems – CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science, pages 15–29. Springer, 2005.
    • (2005) Cryptographic Hardware and Embedded Systems – CHES 2005 , pp. 15-29
    • Agrawal, D.1    Rao, J.R.2    Rohatgi, P.3    Schramm, K.4
  • 4
    • 35048848490 scopus 로고    scopus 로고
    • Provably Secure Masking of AES
    • Helena Handschuh and M. Anwar Hasan, editors, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers, volume 3357 of Lecture Notes in Computer Science, Springer
    • Johannes Blömer, Jorge Guajardo, and Volker Krummel. Provably Secure Masking of AES. In Helena Handschuh and M. Anwar Hasan, editors, Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers, volume 3357 of Lecture Notes in Computer Science, pages 69–83. Springer, 2005.
    • (2005) Selected Areas in Cryptography, 11Th International Workshop, SAC 2004 , pp. 69-83
    • Blömer, J.1    Guajardo, J.2    Krummel, V.3
  • 5
    • 35248899532 scopus 로고    scopus 로고
    • Template Attacks
    • Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, volume 2523 of Lecture Notes in Computer Science, Springer
    • Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi. Template Attacks. In Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems – CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, volume 2523 of Lecture Notes in Computer Science, pages 13–28. Springer, 2003.
    • (2003) Cryptographic Hardware and Embedded Systems – CHES 2002, 4Th International Workshop , pp. 13-28
    • Chari, S.1    Rao, J.R.2    Rohatgi, P.3
  • 6
    • 84891445887 scopus 로고    scopus 로고
    • More Differential Power Analysis: Selected DPA Attacks
    • June, Side Channel and Fault Analysis
    • Joshua Jaffe. More Differential Power Analysis: Selected DPA Attacks, June 2006. Presented at ECRYPT Summerschool on Cryptographic Hardware, Side Channel and Fault Analysis.
    • (2006) Presented at ECRYPT Summerschool on Cryptographic Hardware
    • Jaffe, J.1
  • 7
    • 27244453895 scopus 로고    scopus 로고
    • On Second-Order Differential Power Analysis
    • Josyula R. Rao and Berk Sunar, editors, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science, Springer
    • Marc Joye, Pascal Paillier, and Berry Schoenmakers. On Second-Order Differential Power Analysis. In Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems – CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science, pages 293–308. Springer, 2005.
    • (2005) Cryptographic Hardware and Embedded Systems – CHES 2005 , pp. 293-308
    • Joye, M.1    Paillier, P.2    Schoenmakers, B.3
  • 9
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Michael Wiener, editor, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, volume 1666 of Lecture Notes in Computer Science, Springer
    • Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power Analysis. In Michael Wiener, editor, Advances in Cryptology - CRYPTO ’99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, volume 1666 of Lecture Notes in Computer Science, pages 388–397. Springer, 1999.
    • (1999) Advances in Cryptology - CRYPTO ’99, 19Th Annual International Cryptology Conference , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 10
    • 33745679179 scopus 로고    scopus 로고
    • Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers
    • David Pointcheval, editor, San Jose, CA, USA, February 13-17, 2006, Proceedings, volume 3860 of Lecture Notes in Computer Science, Springer
    • Elisabeth Oswald, Stefan Mangard, Christoph Herbst, and Stefan Tillich. Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. In David Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, The Cryptographers’ Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, volume 3860 of Lecture Notes in Computer Science, pages 192–207. Springer, 2006.
    • (2006) Topics in Cryptology - CT-RSA 2006, the Cryptographers’ Track at the RSA Conference 2006 , pp. 192-207
    • Oswald, E.1    Mangard, S.2    Herbst, C.3    Tillich, S.4
  • 11
    • 27244438087 scopus 로고    scopus 로고
    • Improved Higher-Order Side-Channel Attacks with FPGA Experiments
    • Josyula R. Rao and Berk Sunar, editors, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science, Springer
    • Eric Peeters, François-Xavier Standaert, Nicolas Donckers, and Jean-Jacques Quisquater. Improved Higher-Order Side-Channel Attacks with FPGA Experiments. In Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems – CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science, pages 309–323. Springer, 2005.
    • (2005) Cryptographic Hardware and Embedded Systems – CHES 2005, 7Th International Workshop , pp. 309-323
    • Peeters, E.1    Standaert, F.-X.2    Donckers, N.3    Quisquater, J.-J.4
  • 12
    • 34548732914 scopus 로고    scopus 로고
    • Practical Template Attacks
    • Chae Hoon Lim and Moti Yung, editors, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, volume 3325 of Lecture Notes in Computer Science, Springer
    • Christian Rechberger and Elisabeth Oswald. Practical Template Attacks. In Chae Hoon Lim and Moti Yung, editors, Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, volume 3325 of Lecture Notes in Computer Science, pages 443–457. Springer, 2004.
    • (2004) Information Security Applications, 5Th International Workshop, WISA 2004 , pp. 443-457
    • Rechberger, C.1    Oswald, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.