안전한 부채널 공격 내성을 위한 Constant Timing 구현 동향 |
Kim, Hyunjun
(한성대학교 IT융합공학부)
Park, Jaehoon (한성대학교 IT융합공학부) Sim, Minjoo (한성대학교 IT융합공학부) Seo, Hwajeong (한성대학교 IT융합공학부) |
1 | Gueron, S., Kounavis, M. E., "Intel® carry-less multiplication instruction and its usage for computing the GCM mode," White Paper, 2010. |
2 | Liu, Z., Seo, H., Chen, C. N., Nogami, Y., Park, T., Choi, J., Kim, H., "Secure GCM implementation on AVR," Discrete Applied Mathematics, 241, pp. 58-66, 2018. DOI |
3 | Fujii, H., Rodrigues, F. C., Lopez, J., "Fast AES Implementation Using ARMv8 ASIMD Without Cryptography Extension," In International Conference on Information Security and Cryptology, pp. 84-101, 2019. |
4 | Rebeiro, C., Selvakumar, D. Devi, A. S. L., "Bitslice implementation of AES," In International Conference on Cryptology and Network Security, pp. 203-212, 2006. |
5 | May, L., Penna, L., Clark, A., "An implementation of bitsliced DES on the pentium MMX TM processor," In Australasian Conference on Information Security and Privacy, pp. 112-122, 2000. |
6 | Boyar, J., Peralta, R., "A new combinational logic minimization technique with applications to cryptology," In International Symposium on Experimental Algorithms, pp. 178-189, 2010. |
7 | Kwon, H., Kim, H., Choi, S. J., Jang, K., Park, J., Kim, H., Seo, H., "Compact Implementation of CHAM Block Cipher on Low-End Microcontrollers," In International Conference on Information Security Applications, pp. 127-141, 2020. |
8 | Kim, H., Jeon, Y., Kim, G., Kim, J., Sim, B. Y., Han, D. G., Seo, H., Kim, S., Hong, S., Sung, J., Hong, D. A, "New Method for Designing Lightweight S-Boxes with High Differential and Linear Branch Numbers, and Its Application," In International Conference on Information Security and Cryptology, 2020. |
9 | Adomnicai, A., Najm, Z., Peyrin, T., "Fixslicing: A New GIFT Representation," IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020. |
10 | Adomnicai, A., Peyrin, T., "Fixslicing AES-like Ciphers," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 402-425, 2021. |
11 | Seo, S. C., Seo, H., "Highly efficient implementation of NIST-compliant Koblitz curve for 8-bit AVR-based sensor nodes," IEEE Access, vol. 6, pp. 67637-67652, 2018. DOI |
12 | NIST, "The official document describing the DES standard," Technical Report, 1999. |
13 | Gueron, S., "Intel advanced encryption standard (AES) new instructions set," 2010. |
14 | Biham, E. "A fast new DES implementation in software," In International Workshop on Fast Software Encryption, pp. 260-272, 1997. |
15 | Bernstein, D. J., "Cache-timing attacks on AES," 2005. |
16 | Daemen, J., Rijmen, V., "AES proposal: Rijndael," 1999. |
17 | Reis, T. B., Aranha, D. F., Lopez, J., "PRESENT runs fast," In International Conference on Cryptographic Hardware and Embedded Systems, pp. 644-664, 2017. |
18 | Lomont, C., "Introduction to intel advanced vector extensions," Intel white paper, 2011. |
19 | Seo, H., Jeong, I., Lee, J., Kim, W. H., "Compact implementations of ARX-based block ciphers on IoT processors," ACM Transactions on Embedded Computing Systems (TECS), vol. 17, no. 3, pp. 1-16, 2018. |