Performance Improvement of Power Attacks with Truncated Differential Cryptanalysis |
Kang, Tae-Sun
(Graduate School of Information Management and Security, Korea University)
Kim, Hee-Seok (Graduate School of Information Management and Security, Korea University) Kim, Tae-Hyun (Graduate School of Information Management and Security, Korea University) Kim, Jong-Sung (Graduate School of Information Management and Security, Korea University) Hong, Seok-Hie (Graduate School of Information Management and Security, Korea University) |
1 | K. Schramm and C. Paar, "Higher Order Masking of the AES," RSA Conference 2006, Cryptographers' Track, LNCS 3860, pp. 208–225, 2006 |
2 | P. Kocher, J. Jaffe, and B. Jun, "Introduction to Differential Power Analysis and Related Attacks," Technical Report, Cryptography Research Inc., 1998. |
3 | National Institute of Standards and Technology (NIST), "Advanced Encryption Standard," FIPS Publication 197, pp. 7-25, 1999 |
4 | L.R. Knudsen, "Truncated and Higher Order Differential," Fast Software Encryption Workshop 1994, LNCS 1008, pp. 229-236, 1995 |
5 | M.L. Akkar, R. Bevan, and L. Goubin, "Two Power Analysis Attacks against One-Mask Methods," Fast Software Encryption Workshop 2004, LNCS 3017, pp. 332-347, 2004 |
6 | E. Biham and A. Shamir, "Differential Cryptanalysis of DES-like Cryptosystems," Journal of Cryptology, vol. 4, no. 1, pp.3-72, Jan. 1991 DOI |
7 | National Institute of Standards and Technology (NIST), "Data Encryption Standard," FIPS Publication 46-3, pp. 8-21, 1999 |
8 | T.S. Messerges, "Power analysis Attacks and Countermeasures for Cryptographic Algorithms," Ph.D. Thesis, University of Illinois, pp. 541-548, Jan. 2000 |
9 | H. Handschuh and B. Preneel, "Blind Differential Cryptanalysis for Enhanced Power Attacks," Workshop on Selected Areas in Cryptography 2006, LNCS 4356, pp. 163-173, 2007 |