A Pre-processing Technique for Performance Enhancement of the Differential Power Analysis Attack |
Lee, You-Seok
(Electronics and Telecommunications Research Institute)
Lee, Yu-Ri (Pusan National University) Lee, Young-Jun (Pusan National University) Kim, Hyoung-Nam (Pusan National University) |
1 | K. Gandolfi, C. Mourtel, and F. Oliver, Electromagnetic Attacks: Concrete Results, in Proceedings of CHES 2001. |
2 | S. Mangard, E. Oswald, and T.Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer Science + Business Media, LLC., 2007. |
3 | P. Kocher, J. Jaffe, and B. Jun, "Introduction to Differential Power Analysis and Related attacks," White Paper, Cryptography Research, http://www.cryptography.com/dpa/technical, 1998. |
4 | 류정춘, 한동국, 김성경, 김희석, 김태현, 이상진, "웨이블릿 기반의 차분전력분석 기법 제안", 정보보호학회논문지, 19(3), pp.27-34, 2009년 6월. 과학기술학회마을 |
5 | Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, 2001. |
6 | J.J. Quisquater and D. Samyde, Electromagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards, in Proceedings of e-Smart 2001. |
7 | P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA. DSS. and Other Systems," Advances in Cryptology-Crypto, 1996, LNCS 1109, pp. 104-113, 1996. |
8 | P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," CRYPTO 1999, LNCS 1666, pp. 388-397, 1999. |
9 | E. Brier, C. Clavier, and F. Olivier, "Correlation power analysis with a leakage model," CHES 2004, LNCS 3156, pp. 16-29, 2004. |
10 | T.H. Le, J. Clediere, C. Serviere, and J.L. Lacoume, "Noise Re-duction in Side channel Attack Using Fourth-Order Cumulant," IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 710-720, Dec. 2007. DOI |