http://iet.metastore.ingenta.com
1887

access icon openaccess Probing attack of share-serial threshold implementation of advanced encryption standard

Loading full text...

Full text loading...

/deliver/fulltext/el/55/9/EL.2018.7518.html;jsessionid=av10q2nguofm.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fel.2018.7518&mimeType=html&fmt=ahah

References

    1. 1)
      • 1. Kocher, P.C., Jaffe, J., Jun, B.: ‘Differential power analysis’. Advances in Cryptology - CRYPTO '99, 19th Annual Int. Cryptology Conf., Santa Barbara, California, USA, 15–19 August 1999, (LNCS, 1666), pp. 388397.
    2. 2)
      • 2. Sugawara, T., Shoji, N., Sakiyama, K., et al: ‘Exploiting bitflip detector for non-invasive probing and its application to ineffective fault analysis’. 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2017, Taipei, Taiwan, 25 September 2017, pp. 4956.
    3. 3)
      • 3. Ishai, Y., Sahai, A., Wagner, D.A.. ‘Private circuits: securing hardware against probing attacks’. Advances in Cryptology - CRYPTO 2003, 23rd Annual Int. Cryptology Conf., Santa Barbara, California, USA, 17–21 August 2003, (LNCS, 2729), pp. 463481.
    4. 4)
    5. 5)
      • 5. Wegener, F., Moradi, A.. ‘A first-order SCA resistant AES without fresh randomness’. Constructive Side-Channel Analysis and Secure Design - 9th Int. Workshop, COSADE 2018, Singapore, 23–24 April 2018, (LNCS, 10815), pp. 245262.
    6. 6)
      • 6. J, Schmidt, C.H., Kim. ‘A probing attack on AES’. Information Security Applications, 9th Int. Workshop, WISA 2008, Jeju Island, Korea, 23–25 September 2008, (LNCS, 5379), pp. 256265.
http://iet.metastore.ingenta.com/content/journals/10.1049/el.2018.7518
Loading

Related content

content/journals/10.1049/el.2018.7518
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address