Efficient Masked Implementation for SEED Based on Combined Masking |
Kim, Hee-Seok
(Center for Information Security Technologies, Korea University)
Cho, Young-In (Center for Information Security Technologies, Korea University) Choi, Doo-Ho (Software Research Laboratory, ETRI) Han, Dong-Guk (Department of Mathematics, Kookmin University) Hong, Seok-Hie (Center for Information Security Technologies, Korea University) |
1 | Korea Internet & Security Agency, "Block Cipher Algorithm SEED." Available at: http://seed.kisa.or.kr/eng/about/about.jsp |
2 | D. Kwon et al., "New Block Cipher: ARIA," ICISC, LNCS, Springer-Verlag, vol. 2971, 2004, pp. 432-445. |
3 | J. Daemen and V. Rijmen, The Design of Rijndael: AES - The Advanced Encryption Standard, Springer-Verlag, 2002. |
4 | L. Goublin, "A Sound Method for Switching between Boolean and Arithmetic Masking," CHES, LNCS, Springer-Verlag, vol. 2162, 2001, pp. 3-15. |
5 | J.S. Coron and A. Tchulkine, "A New Algorithm for Switching from Arithmetic to Boolean Masking," CHES, LNCS, Springer-Verlag, vol. 2779, 2003, pp. 89-97. |
6 | K. Schramm and C. Paar, "Higher Order Masking of the AES," CT-RSA, LNCS, Springer-Verlag, vol. 3860, 2006, pp. 208-225. |
7 | M.L. Akkar and C. Giraud, "An Implementation of DES and AES, Secure against Some Attacks," CHES, LNCS, Springer-Verlag, vol. 2162, 2001, pp. 309-318. |
8 | E. Oswald and K. Schramm "An Efficient Masking Scheme for AES Software Implementations," WISA, LNCS, Springer-Verlag, vol. 3786, 2006, pp. 292-305. |
9 | T. Messerges, "Securing the AES Finalists against Power Analysis Attacks," FSE, LNCS, Springer-Verlag, vol. 1978, 2001, pp. 293-301. |
10 | C. Herbst, E. Oswald, and S. Mangard, "An AES Smart Card Implementation Resistant to Power Analysis Attacks," ACNS, LNCS, Springer-Verlag, vol. 3989, 2006, pp. 239-252. |
11 | B. Schneier, "Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)," FSE, LNCS, Springer-Verlag, vol. 809, 1993, pp. 191-204. |
12 | E. Trichina, D.S. Seta, and L. Germani, "Simplified Adaptive Multiplicative Masking for AES," CHES, LNCS, Springer-Verlag, vol. 2523, 2003, pp. 71-85. |
13 | J. Blomer, J. Guajardo, and V. Krummel. "Provably Secure Masking of AES," SAC, LNCS, Springer-Verlag, vol. 3357, 2005, pp. 69-83. |
14 | P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," CRYPTO, Springer-Verlag, 1999, pp. 388-397. |
15 | O. Neibe and J. Pulkus, "Switching Blindings with a View Towards IDEA," CHES, LNCS, Springer-Verlag, vol. 3156, 2004, pp. 125-133. |
16 | H.S. Kim et al., "Efficient Masking Methods Appropriate for the Block Ciphers ARIA and AES," ETRI J., vol. 32, no. 3, June 2010, pp. 370-379. DOI |
17 | Atmel Corporation. Datasheet: ATmega128(L). Available at:http://www.atmel.com/products/avr/ |
18 | E. Biham and V. Furman, "Impossible Differential on 8-Round MARS Core," NESSIE, NES/DOC/TEC/WP3/001/1, Sept. 11, 2000. |
19 | GOST, Gosudarstvennyi Standard 28147-89, "Cryptographic Protection for Data Processing Systems," Government Committee of the USSR for Standards, 1989. |