메뉴 건너뛰기




Volumn 20, Issue 1-4, 2002, Pages 191-210

Optimized Timing Attacks Against Public Key Cryptosystems

Author keywords

cryptography; statistical decision problem; timing attack

Indexed keywords


EID: 84983436061     PISSN: 21931402     EISSN: 21967040     Source Type: Journal    
DOI: 10.1524/strm.2002.20.14.191     Document Type: Article
Times cited : (25)

References (14)
  • 4
    • 85025266676 scopus 로고
    • An Introduction to Probability Theory and its Applications (Vol
    • New York
    • Feller, W.: An Introduction to Probability Theory and its Applications (Vol. 1), New York, Wiley (1967).
    • (1967) 1)
    • Feller, W.1
  • 5
    • 84876346090 scopus 로고
    • The Central Limit Theorem for Dependent Random Variables
    • Hoeffding, W. and Robbins, H.: The Central Limit Theorem for Dependent Random Variables, Duke Math. J. 15, 773-780 (1948).
    • (1948) Duke Math , vol.15 , pp. 773-780
    • Hoeffding, W.1    Robbins, H.2
  • 6
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA
    • N. Koblitz (ed.)
    • Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems. In: N. Koblitz (ed.): Advances in Cryptology - Crypto '96. Lecture Notes in Computer Science 1109, Berlin, Springer (1996), 104-113.
    • (1996) DSS and Other Systems , pp. 104-113
    • Kocher, P.1
  • 7
    • 84939573910 scopus 로고
    • Differential Power Analysis
    • In: M. Wiener (ed.): Advances in Cryptology - Crypto '99 (Proceedings)
    • Kocher, P., Jaffe, J., and Jub, B.: Differential Power Analysis. In: M. Wiener (ed.): Advances in Cryptology - Crypto '99 (Proceedings). Lecture Notes in Computer Science 1666, Berlin, Springer (1999), 388-397.
    • (1666) Lecture Notes in Computer Science , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jub, B.3
  • 10
    • 84966243285 scopus 로고    scopus 로고
    • Modular Multiplication without Trial Division
    • (April 1985)
    • Montgomery, P.L.: Modular Multiplication without Trial Division, Math. Comp. 44, no. 170, 519-521 (April 1985).
    • Math. Comp. 44 , pp. 519-521
    • Montgomery, P.L.1
  • 11
    • 68549092451 scopus 로고    scopus 로고
    • A Timing Attack against RSA with the Chinese Remainder Theorem
    • C. Paar (eds.)
    • Schindler, W.: A Timing Attack against RSA with the Chinese Remainder Theorem. In: ç.K. Koç, C. Paar (eds.): Cryptographic Hardware and Embedded Systems CHES 2000. Lecture Notes in Computer Science 1965, Berlin, Springer (2000), 109-124.
    • (2000) ç.K. Koç , pp. 109-124
    • Schindler, W.1
  • 12
    • 18844409918 scopus 로고    scopus 로고
    • Unleashing the Full Power of Timing Attack
    • Submitted.
    • Schindler, W., Koeune, F., and Quisquater, J.-J.: Unleashing the Full Power of Timing Attack. Submitted.
    • Schindler, W.1    Koeune, F.2    Quisquater, J.-J.3
  • 14
    • 0003774228 scopus 로고
    • Mathematische Statistik I
    • Stuttgart, Teubner
    • Witting, H.: Mathematische Statistik I, Stuttgart, Teubner (1985).
    • (1985)
    • Witting, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.