메뉴 건너뛰기




Volumn 2, Issue 4, 1999, Pages 416-437

Strength of Two Data Encryption Standard Implementations Under Timing Attacks

Author keywords

Cryptanalysis; cryptography; Data Encryption Standard; Security; timing attack

Indexed keywords


EID: 85017093014     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/330382.330390     Document Type: Article
Times cited : (15)

References (23)
  • 1
    • 0026397734 scopus 로고
    • Differential cryptanalysis of DES-like cryptosystems
    • Biham, E. and Shamir, A. 1991. Differential cryptanalysis of DES-like cryptosystems. J. Cryptology 4, 1, 3-72
    • (1991) J. Cryptology , vol.4 , Issue.1 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 2
    • 0002683004 scopus 로고
    • Differential cryptanalysis of the full 16-round DES
    • In Proceedings of the Conference on Advances in Cryptology (CRYPTO'92, Santa Barbara, CA), E. F. Brickell, Ed. Springer-Verlag, New York
    • Biham, E. and Shamir, A. 1993. Differential cryptanalysis of the full 16-round DES. In Proceedings of the Conference on Advances in Cryptology (CRYPTO'92, Santa Barbara, CA), E. F. Brickell, Ed. Springer-Verlag, New York, 494-502
    • (1993) , pp. 494-502
    • Biham, E.1    Shamir, A.2
  • 3
    • 28444480349 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • Electrical Engineering Department, Technion-Israel Institute of Technology, Haifa, Israel
    • Biham, E. and Shamir, A. 1997. Differential fault analysis of secret key cryptosystems. CS0910. Electrical Engineering Department, Technion-Israel Institute of Technology, Haifa, Israel
    • (1997) CS0910
    • Biham, E.1    Shamir, A.2
  • 5
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • In Proceedings of the Conference on Advances in Cryptology (CRYPTO'82, Santa Barbara, CA), D. Chaum, R. L. Rivest, and A. T. Sherman, Eds. Plenum Press, New York, NY
    • Chaum, D. 1983. Blind signatures for untraceable payments. In Proceedings of the Conference on Advances in Cryptology (CRYPTO'82, Santa Barbara, CA), D. Chaum, R. L. Rivest, and A. T. Sherman, Eds. Plenum Press, New York, NY, 199-203
    • (1983) , pp. 199-203
    • Chaum, D.1
  • 8
    • 0030107358 scopus 로고    scopus 로고
    • Network security under siege: the timing attack
    • English, E. and Hamilton, S. 1996. Network security under siege: the timing attack. IEEE Computer 29, 3, 95-97
    • (1996) IEEE Computer , vol.29 , Issue.3 , pp. 95-97
    • English, E.1    Hamilton, S.2
  • 9
    • 0003421261 scopus 로고
    • An Introduction to Probability Theory and its Applications
    • 2nd ed. John Wiley & Sons, Inc., New York, NY
    • Feller, W. 1966. An Introduction to Probability Theory and its Applications. 2nd ed. John Wiley & Sons, Inc., New York, NY
    • (1966)
    • Feller, W.1
  • 10
    • 85024290888 scopus 로고    scopus 로고
    • A timing attack on RC5
    • In Proceedings of the Workshop on Selected Areas of Cryptography (SAC'98, Aug.), S. Tavares and H. Meijer, Eds. Springer-Verlag, New York, NY
    • Handschuh, H. 1998. A timing attack on RC5. In Proceedings of the Workshop on Selected Areas of Cryptography (SAC'98, Aug.), S. Tavares and H. Meijer, Eds. Springer-Verlag, New York, NY
    • (1998)
    • Handschuh, H.1
  • 12
    • 85024291587 scopus 로고    scopus 로고
    • A timing attack on RC5
    • In Proceedings of the Workshop on Selected Areas of Cryptography (SAC'98, Aug.), S. Tavares and H. Meijer, Eds. Springer-Verlag, New York, NY
    • Heys, H. M. 1998. A timing attack on RC5. In Proceedings of the Workshop on Selected Areas of Cryptography (SAC'98, Aug.), S. Tavares and H. Meijer, Eds. Springer-Verlag, New York, NY
    • (1998)
    • Heys, H.M.1
  • 13
    • 0004238551 scopus 로고    scopus 로고
    • Probability and Statistical Inference
    • 5th ed. Prentice-Hall, New York, NY
    • Hogg, R. and Tanis, E. 1997. Probability and Statistical Inference. 5th ed. Prentice-Hall, New York, NY
    • (1997)
    • Hogg, R.1    Tanis, E.2
  • 14
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • In Proceedings of the Conference on Advances in Cryptology (CRYPTO '96, Santa Barbara, CA), N. Koblitz, Ed. Springer-Verlag, New York
    • Kocher, P. 1996. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Proceedings of the Conference on Advances in Cryptology (CRYPTO '96, Santa Barbara, CA), N. Koblitz, Ed. Springer-Verlag, New York, 104-113
    • (1996) , pp. 104-113
    • Kocher, P.1
  • 15
    • 84949274030 scopus 로고    scopus 로고
    • Potential flaw seen in cash card security
    • The New York Times
    • Markoff, J. 1996. Potential flaw seen in cash card security. The New York Times
    • (1996)
    • Markoff, J.1
  • 16
    • 85028754650 scopus 로고
    • The first experimental crytanalysis of the data encryption standard. In Proceedings of the Conference on Advances in Cryptology (CRYPTO'94, Santa Barbara, CA), Y. G. Desmedt, Ed. Springer-Verlag, New York
    • Matsui, M. 1994. The first experimental crytanalysis of the data encryption standard. In Proceedings of the Conference on Advances in Cryptology (CRYPTO'94, Santa Barbara, CA), Y. G. Desmedt, Ed. Springer-Verlag, New York, 1-11
    • (1994) , pp. 1-11
    • Matsui, M.1
  • 17
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for DES cipher
    • Advances in Cryptology (EUROCRYPT'93, Lofthus, Norway, May 23-27), T. Helleseth, Ed. Springer Lecture Notes in Computer Science Springer-Verlag, Secaucus, NJ
    • Matsui, M. 1994. Linear cryptanalysis method for DES cipher. In Proceedings of the Workshop on The Theory and Application of Cryptographic Techniques, Advances in Cryptology (EUROCRYPT'93, Lofthus, Norway, May 23-27), T. Helleseth, Ed. Springer Lecture Notes in Computer Science Springer-Verlag, Secaucus, NJ, 386-397
    • (1994) Proceedings of the Workshop on The Theory and Application of Cryptographic Techniques , pp. 386-397
    • Matsui, M.1
  • 18
  • 19
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • (Feb.)
    • Rivest, R., Shamir, A., and Adelman, L. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (Feb.), 120-126
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adelman, L.3
  • 20
    • 84950039816 scopus 로고
    • A First Course in Probability
    • Co.
    • Ross, S. 1988. A First Course in Probability. 3rd ed. Macmillan Publishing Co., Inc., Indianapolis, IN
    • (1988) 3rd ed. Macmillan Publishing
    • Ross, S.1
  • 21
    • 0003851399 scopus 로고
    • Applied Cryptography: Protocols, Algorithms, and Source Code in C
    • 2nd ed. John Wiley & Sons, Inc., New York, NY
    • Schneier, B. 1995. Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd ed. John Wiley & Sons, Inc., New York, NY
    • (1995)
    • Schneier, B.1
  • 22
    • 0003987443 scopus 로고
    • Cryptography: Theory and Practice
    • 1st ed. CRC Press, Inc., Boca Raton, FL
    • Stinson, D. R. 1995. Cryptography: Theory and Practice. 1st ed. CRC Press, Inc., Boca Raton, FL
    • (1995)
    • Stinson, D.R.1
  • 23
    • 0004138931 scopus 로고
    • The Theory of Statistical Inference
    • John Wiley & Sons, Inc., New York, NY
    • Zacks, S. 1971. The Theory of Statistical Inference. John Wiley & Sons, Inc., New York, NY
    • (1971)
    • Zacks, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.