Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon openaccess Probing attack of share-serial threshold implementation of advanced encryption standard

Loading full text...

Full text loading...

/deliver/fulltext/el/55/9/EL.2018.7518.html;jsessionid=16uqv6rouc292.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fel.2018.7518&mimeType=html&fmt=ahah

References

    1. 1)
      • 3. Ishai, Y., Sahai, A., Wagner, D.A.. ‘Private circuits: securing hardware against probing attacks’. Advances in Cryptology - CRYPTO 2003, 23rd Annual Int. Cryptology Conf., Santa Barbara, California, USA, 17–21 August 2003, (LNCS, 2729), pp. 463481.
    2. 2)
      • 6. J, Schmidt, C.H., Kim. ‘A probing attack on AES’. Information Security Applications, 9th Int. Workshop, WISA 2008, Jeju Island, Korea, 23–25 September 2008, (LNCS, 5379), pp. 256265.
    3. 3)
      • 1. Kocher, P.C., Jaffe, J., Jun, B.: ‘Differential power analysis’. Advances in Cryptology - CRYPTO '99, 19th Annual Int. Cryptology Conf., Santa Barbara, California, USA, 15–19 August 1999, (LNCS, 1666), pp. 388397.
    4. 4)
      • 2. Sugawara, T., Shoji, N., Sakiyama, K., et al: ‘Exploiting bitflip detector for non-invasive probing and its application to ineffective fault analysis’. 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2017, Taipei, Taiwan, 25 September 2017, pp. 4956.
    5. 5)
    6. 6)
      • 5. Wegener, F., Moradi, A.. ‘A first-order SCA resistant AES without fresh randomness’. Constructive Side-Channel Analysis and Secure Design - 9th Int. Workshop, COSADE 2018, Singapore, 23–24 April 2018, (LNCS, 10815), pp. 245262.
http://iet.metastore.ingenta.com/content/journals/10.1049/el.2018.7518
Loading

Related content

content/journals/10.1049/el.2018.7518
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address