Browse > Article

안전한 부채널 공격 내성을 위한 Constant Timing 구현 동향  

Kim, Hyunjun (한성대학교 IT융합공학부)
Park, Jaehoon (한성대학교 IT융합공학부)
Sim, Minjoo (한성대학교 IT융합공학부)
Seo, Hwajeong (한성대학교 IT융합공학부)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Gueron, S., Kounavis, M. E., "Intel® carry-less multiplication instruction and its usage for computing the GCM mode," White Paper, 2010.
2 Liu, Z., Seo, H., Chen, C. N., Nogami, Y., Park, T., Choi, J., Kim, H., "Secure GCM implementation on AVR," Discrete Applied Mathematics, 241, pp. 58-66, 2018.   DOI
3 Fujii, H., Rodrigues, F. C., Lopez, J., "Fast AES Implementation Using ARMv8 ASIMD Without Cryptography Extension," In International Conference on Information Security and Cryptology, pp. 84-101, 2019.
4 Rebeiro, C., Selvakumar, D. Devi, A. S. L., "Bitslice implementation of AES," In International Conference on Cryptology and Network Security, pp. 203-212, 2006.
5 May, L., Penna, L., Clark, A., "An implementation of bitsliced DES on the pentium MMX TM processor," In Australasian Conference on Information Security and Privacy, pp. 112-122, 2000.
6 Boyar, J., Peralta, R., "A new combinational logic minimization technique with applications to cryptology," In International Symposium on Experimental Algorithms, pp. 178-189, 2010.
7 Kwon, H., Kim, H., Choi, S. J., Jang, K., Park, J., Kim, H., Seo, H., "Compact Implementation of CHAM Block Cipher on Low-End Microcontrollers," In International Conference on Information Security Applications, pp. 127-141, 2020.
8 Kim, H., Jeon, Y., Kim, G., Kim, J., Sim, B. Y., Han, D. G., Seo, H., Kim, S., Hong, S., Sung, J., Hong, D. A, "New Method for Designing Lightweight S-Boxes with High Differential and Linear Branch Numbers, and Its Application," In International Conference on Information Security and Cryptology, 2020.
9 Adomnicai, A., Najm, Z., Peyrin, T., "Fixslicing: A New GIFT Representation," IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020.
10 Adomnicai, A., Peyrin, T., "Fixslicing AES-like Ciphers," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 402-425, 2021.
11 Seo, S. C., Seo, H., "Highly efficient implementation of NIST-compliant Koblitz curve for 8-bit AVR-based sensor nodes," IEEE Access, vol. 6, pp. 67637-67652, 2018.   DOI
12 NIST, "The official document describing the DES standard," Technical Report, 1999.
13 Gueron, S., "Intel advanced encryption standard (AES) new instructions set," 2010.
14 Biham, E. "A fast new DES implementation in software," In International Workshop on Fast Software Encryption, pp. 260-272, 1997.
15 Bernstein, D. J., "Cache-timing attacks on AES," 2005.
16 Daemen, J., Rijmen, V., "AES proposal: Rijndael," 1999.
17 Reis, T. B., Aranha, D. F., Lopez, J., "PRESENT runs fast," In International Conference on Cryptographic Hardware and Embedded Systems, pp. 644-664, 2017.
18 Lomont, C., "Introduction to intel advanced vector extensions," Intel white paper, 2011.
19 Seo, H., Jeong, I., Lee, J., Kim, W. H., "Compact implementations of ARX-based block ciphers on IoT processors," ACM Transactions on Embedded Computing Systems (TECS), vol. 17, no. 3, pp. 1-16, 2018.