References
- P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," Proc. CRYPTO, LNCS, vol. 1666, 1999, pp. 388-397.
- S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer, 2007.
- T. Messerges, "Using Second-Order Power Analysis to Attack DPA Resistance Software," Proc. CHES, LNCS, vol. 1965, 2000, pp. 238-251.
- National Security Research Institute: The ARIA Specification, http://210.104.33.10/ARIA/index-e.html
- D. Kwon et al., "New Block Cipher: ARIA," Proc. ICISC, LNCS, vol. 2971, Nov. 2003, pp. 432-445.
- S. Lee, S. Moon, and J. Kim, "High-Speed Hardware Architectures for ARIA with Composite Field Arithmetic and Area-Throughput Trade-Offs," ETRI J., vol. 30, no. 5, Oct. 2008, 2008, pp. 696-706.
- H. Kim et al., "Efficient Masking Method Appropriate for the Block Ciphers ARIA and AES," ETRI J., vol. 32, no. 3, June 2010, pp. 370-379.
- C. Kim, M. Schläfferm, and S. Moon, "Differential Side Channel Analysis Attack on FPGA Implementations of ARIA," ETRI J., vol. 30, no. 2, Apr. 2008, pp. 315-325.
- W. Li, D. Gu, and J. Li, "Differential Fault Analysis on the ARIA Algorithm," Info. Sci., vol. 178, no. 19, 2008, pp. 3727-3737.
- H. Yoo et al., "A Secure Masking-Based ARIA Countermeasure for Low Memory Environment Resistant to Differential Power Attack," J. KIISC, vol. 16, 2006, pp. 143-155.
- J. Park et al., "Low Power Compact Design of ARIA Block Cipher," Proc. ISCAS, IEEE, 2006, pp. 313-316.
- S. Yang, J. Park, and Y. You, "The Smallest ARIA Module with 16-Bit Architecture," Proc. ICISC, LNCS, vol. 4296, 2006, pp. 107-117.
- B. Koo et al., "Design and Implementation of Unified Hardware for 128-Bit Block Ciphers ARIA and AES," ETRI J., vol. 29, no. 6, Dec. 2007, pp. 820-822.
- A. Satoh et al., "A Compact Rijndael Hardware Architecture with S-Box Optimization," Proc. ASIACRYPTO, LNCS, vol. 2248, 2001, pp. 239-254.
- J. Wolkerstorfer, E. Oswald, and M. Lamberger, "An ASIC Implementation of the AES S-Boxes," Proc. CT-RSA, LNCS, vol. 2271, 2002, pp. 67-78.
- P. Chodowiec and K. Gaj, "Very Compact FPGA Implementation of the AES Algorithm," Proc. CHES, LNCS, vol. 2779, 2003, pp. 319-333.
- E. Oswald et al., "A Side-Channel Analysis Resistant Description of the AES S-Box," Proc. FSE, LNCS, vol. 3557, 2005, pp. 413- 423.
- B. Zakeri et al., "Compact and Secure Design of Masked AES SBox," LNCS, vol. 4861, 2007, pp. 216-229.
- M. Feldhofer, S. Dominikus, and J. Wolkerstofer, "Strong Authentication for RFID System Using the AES Algorithm," Proc. CHES, LNCS, vol. 3156, 2004, pp. 357-370.
- E. Brier, C. Clavier, and F. Olivier, "Correlation Power Analysis with a Leakage Model," Proc. CHES, LNCS, vol. 3156, 2004, pp. 135-152.
Cited by
- 해밍 웨이트 누출 기반 ARIA 키 확장 SPA vol.25, pp.6, 2012, https://doi.org/10.13089/jkiisc.2015.25.6.1319