메뉴 건너뛰기




Volumn 4307 LNCS, Issue , 2006, Pages 529-545

Threshold implementations against side-channel attacks and glitches

Author keywords

Masking; Secret sharing; Side channel attacks

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS; SPEECH INTELLIGIBILITY;

EID: 85010668170     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11935308_38     Document Type: Conference Paper
Times cited : (379)

References (27)
  • 1
    • 27244458972 scopus 로고    scopus 로고
    • Templates as Master Keys
    • J.R. Rao, B. Sunar, Eds, Springer-Verlag
    • Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm, “Templates as Master Keys”, J.R. Rao, B. Sunar, Eds., CHES 2005, LNCS 3659, Springer-Verlag, 2005, pp. 15–29.
    • CHES 2005, LNCS 3659 , vol.2005 , pp. 15-29
    • Agrawal, D.1    Rao, J.R.2    Rohatgi, P.3    Schramm, K.4
  • 2
    • 84943615552 scopus 로고    scopus 로고
    • An implementation of DES and AES, secure against some attacks
    • Ç Koç, D. Naccache, Ch. Paar, Eds, Springer-Verlag
    • Mehdi-Laurent Akkar, Christophe Giraud, “An implementation of DES and AES, secure against some attacks”, Ç Koç, D. Naccache, Ch. Paar, Eds., CHES 2001, LNCS 2162, Springer-Verlag, 2001, pp. 309–318.
    • (2001) CHES 2001, LNCS , vol.2162 , pp. 309-318
    • Akkar, M.-L.1    Giraud, C.2
  • 3
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • George Blakley, Safeguarding cryptographic keys, AFIPS 48, 1979, pp. 313-317.
    • (1979) AFIPS , vol.48 , pp. 313-317
    • Blakley, G.1
  • 4
    • 84961369151 scopus 로고
    • Security of ramp schemes
    • Springer-Verlag
    • George Blakley, Catherine Meadows, “Security of ramp schemes”, CRYPTO ’84, LNCS 196, Springer-Verlag, 1984, pp. 242–268.
    • (1984) CRYPTO ’84, LNCS 196 , pp. 242-268
    • Blakley, G.1    Meadows, C.2
  • 7
    • 35248899532 scopus 로고    scopus 로고
    • Template Attacks
    • B. Kaliski, Ç Koç, Ch. Paar, Eds, Springer-Verlag
    • Suresh Chari, Josyula R. Rao, Pankaj Rohatgi, “Template Attacks”, B. Kaliski, Ç Koç, Ch. Paar, Eds., CHES 2002, LNCS 2523, Springer-Verlag, 2003, pp. 13–28.
    • CHES 2002, LNCS 2523 , vol.2003 , pp. 13-28
    • Chari, S.1    Rao, J.R.2    Rohatgi, P.3
  • 8
    • 84947931331 scopus 로고    scopus 로고
    • Some recent research aspects of threshold cryptography
    • E. Okamoto, G. Davida, M. Mambo, Eds, Springer-Verlag
    • Yvo Desmedt, “Some recent research aspects of threshold cryptography”, E. Okamoto, G. Davida, M. Mambo, Eds., Information Security, LNCS 1396, Springer-Verlag, 1997, pp. 158–173.
    • Information Security, LNCS 1396 , vol.1997 , pp. 158-173
    • Desmedt, Y.1
  • 9
    • 27244432772 scopus 로고    scopus 로고
    • Masking at Gate Level in the Presence of Glitches
    • J.R. Rao, B. Sunar, Eds, Springer-Verlag
    • Wieland Fischer, Berndt M. Gammel, “Masking at Gate Level in the Presence of Glitches,” J.R. Rao, B. Sunar, Eds., CHES 2005, LNCS 3659, Springer-Verlag, 2005, pp. 187–200.
    • CHES 2005, LNCS 3659 , vol.2005 , pp. 187-200
    • Fischer, W.1    Gammel, B.M.2
  • 10
    • 35248830819 scopus 로고    scopus 로고
    • Multiplicative masking and power analysis
    • B. Kaliski, Ç Koç, Ch. Paar, Eds, Springer-Verlag
    • Jovan D. Golić, Christophe Tymen, “Multiplicative masking and power analysis”, B. Kaliski, Ç Koç, Ch. Paar, Eds., CHES 2002, LNCS 2523, Springer-Verlag, 2003, pp. 198–212.
    • (2003) CHES 2002, LNCS , vol.2523 , pp. 198-212
    • Golić, J.D.1    Tymen, C.2
  • 11
    • 84949520149 scopus 로고    scopus 로고
    • DES and differential power analysis – the duplication method
    • Ç. Koç, Ch. Paar, Eds, Springer-Verlag
    • Louis Goubin, Jacques Patarin, “DES and differential power analysis – the duplication method”, Ç. Koç, Ch. Paar, Eds., CHES ’99, LNCS 1717, Springer-Verlag, 1999, pp. 158–172.
    • CHES ’99, LNCS 1717 , vol.1999 , pp. 158-172
    • Goubin, L.1    Patarin, J.2
  • 12
    • 35248830337 scopus 로고    scopus 로고
    • Private circuits: Securing hardware against probing attacks
    • D. Boneh, Ed., Springer-Verlag
    • Yuval Ishai, Amit Sahai, David Wagner, “Private circuits: securing hardware against probing attacks”, D. Boneh, Ed., CRYPTO 2003, LNCS 2729, Springer-Verlag, 2003, pp. 463–481.
    • CRYPTO 2003, LNCS 2729 , vol.2003 , pp. 463-481
    • Ishai, Y.1    Sahai, A.2    Wagner, D.3
  • 13
    • 27244453895 scopus 로고    scopus 로고
    • On second-order differential power analysis
    • J.R. Rao, B. Sunar, Eds, Springer-Verlag
    • Marc Joye, Pascal Paillier, Berry Schoenmakers, “On second-order differential power analysis,” J.R. Rao, B. Sunar, Eds., CHES 2005, LNCS 3659, Springer-Verlag, 2005, pp. 293–308.
    • CHES 2005, LNCS 3659 , vol.2005 , pp. 293-308
    • Joye, M.1    Paillier, P.2    Schoenmakers, B.3
  • 14
    • 84939573910 scopus 로고    scopus 로고
    • M. Wiener, Ed., CRYPTO ’99, LNCS 1666, Springer-Verlag
    • Paul Kocher, Joshua Jaffe, Benjamin Jun, “Differential Power Analysis”, M. Wiener, Ed., CRYPTO ’99, LNCS 1666, Springer-Verlag, 1999, pp. 388–397.
    • Differential Power Analysis , vol.1999 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 18
    • 26444465110 scopus 로고    scopus 로고
    • A Side-Channel Analysis Resistant Description of the AES S-box
    • Springer-Verlag
    • Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen, “A Side-Channel Analysis Resistant Description of the AES S-box”, FSE 2005, LNCS 3557, Springer-Verlag, pp. 413–423.
    • FSE 2005, LNCS , vol.3557 , pp. 413-423
    • Oswald, E.1    Mangard, S.2    Pramstaller, N.3    Rijmen, V.4
  • 19
    • 33745679179 scopus 로고    scopus 로고
    • Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers
    • Springer-Verlag
    • Elisabeth Oswald, Stefan Mangard, Christoph Herbst, Stefan Tillich, “Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers”, CT-RSA 2006, LNCS 3860, Springer-Verlag, pp. 192–207.
    • CT-RSA 2006, LNCS , vol.3860 , pp. 192-207
    • Oswald, E.1    Mangard, S.2    Herbst, C.3    Tillich, S.4
  • 22
    • 33745652931 scopus 로고    scopus 로고
    • Higher Order Masking of the AES
    • Springer-Verlag
    • Kai Schramm, Christof Paar, “Higher Order Masking of the AES”, CT-RSA 2006, LNCS 3860, Springer-Verlag, pp. 208–225.
    • CT-RSA 2006, LNCS 3860 , pp. 208-225
    • Schramm, K.1    Paar, C.2
  • 23
    • 0018545449 scopus 로고
    • How to share a secret
    • Adi Shamir, “How to share a secret”, Commun. ACM 22, 1979, pp. 612-613.
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 25
    • 24144458916 scopus 로고    scopus 로고
    • Small size, low power, side channel immune AES coprocessor design and synthesis results
    • Springer-Verlag
    • Elena Trichina, Tymur Korkishko, “Small size, low power, side channel immune AES coprocessor design and synthesis results”, Proc. fourth conference on the Advanced Encryption Standard (AES4), LNCS 3373, Springer-Verlag, 2005, pp. 113–127.
    • (2005) Proc. Fourth Conference on the Advanced Encryption Standard (AES4), LNCS , vol.3373 , pp. 113-127
    • Trichina, E.1    Korkishko, T.2
  • 27
    • 0020312165 scopus 로고
    • Protocols for secure computation
    • Andrew Yao, “Protocols for secure computation”, FOCS’82, 1982, pp. 160-164.
    • (1982) FOCS’82 , pp. 160-164
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.