New Power Analysis Attack on The Masking Type Conversion Algorithm
![]() |
Cho, Young-In
(Graduate School of Information Management and Security, Korea University)
Kim, Hee-Seok (Graduate School of Information Management and Security, Korea University) Han, Dong-Guk (Department of Mathematics, Kookmin University) Hong, Seok-Hie (Graduate School of Information Management and Security, Korea University) Kang, Ju-Sung (Department of Mathematics, Kookmin University) |
1 | E. Oswald, S. Mangard, N. Pramstaller, and V. Rijmen., "A Side-Channel Analysis Resistant Description of the AES S-box," FSE 2005, LNCS 3557, pp. 413–423, Springer, 2005. |
2 | P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," CRYPTO'9, pp.388-397, Springer -Verlag, 1999. |
3 | P. Kocher, J. Jaffe, and B. Jun, "Introduction to differential power analysis and related attacks," http://www.cryptography.com/dpa/technical, 1998. |
4 | P. Kocher, J. Jaffe, and B. Jun, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Others Systems." CRYPTO'6, LNCS 1109, pp.104-113, Springer-Verlag, 1996. |
5 | T. S. Messerges, E. A. Dabbish, and R. H. Sloan, "Power analysis attacks on modular exponentiation in Smart cards," Proc. of Workshop on Cryptographic Hardware and Embedded Systems, pp.144-157, Springer-Verlag, 1999. |
6 | E. Oswald and K. Schramm. "An Efficient Masking Scheme for AES Software Implementations," TM WISA 2005, LNCS 3786, pp. 292–305, Springer, 2006. |
7 | T. Messerges, "Securing the AES Finalists Against Power Analysis Attacks," Proc. Seventh Int'l Workshop Fast Software Encryption (FSE 2000), pp. 150-164, 2001. |
8 | J.S. Coron, L. Goubin, "On Boolean and Arithmetic Masking against Differential Power Analysis," Proc. of CHES'00, pp. 231-237, 2000. |
9 | J. Bl"omer, J. Guajardo, and V. Krummel. "Provably Secure Masking of AES," SAC 2004, LNCS 3357, pp. 69-83, Springer, 2005. |
![]() |