1 |
Korea Information Security Agencry, "A Design and Analysis of 128-bit Symmetric Block Cipher SEED," 1999. Available at http://www.kisa.or.kr/kisa/seed/jsp/seed_1010.jsp
|
2 |
ISO/IEC 18033-3, "Information technology-Security techniques-Encryption algorithms - Part 3: Block Ciphers," 2005.
|
3 |
W. Li, D. Gu, and J. Li, "Differential Fault Analysis on the ARIA Algorithm," Information Science, Vol. 178, Issue. 19, pp. 3727-3737, Elsevier, 2008.
DOI
ScienceOn
|
4 |
H. Lipmaa and S. Moriai, "Efficient Algorithms for Computing Differential Properties of Addition." FSE'01, LNCS 2355, pp. 336-350, Springer-Verlag, 2002.
|
5 |
H. Yanami and T. Shimoyama, "Differential Cryptanalysis of a Reduced-Round SEED," SCN'02, LNCS 2576, pp. 186-198, Springer-Verlag, 2002.
|
6 |
H. Yoo, C. Kim, J. Ha, S. Moon, and I. Park, "Side Channel Cryptanalysis on SEED," WISA'04, LNCS 3325, pp. Springer-Verlag, 2004.
|
7 |
D. Boneh, R. DeMillio and R. Lipton, "On the importance of checking cryptographic protocols for faults," Eurocrypt'97, LNCS 1233, pp. 37-51, Springer-Verlag, 1997.
|
8 |
P. Dusart, G. Letourneux, and O. Vivolo, "Differntial Fault Attack on AES," ACNS'03, LNCS 2846, pp. 293-306, Springer-Verlag, 2003.
|
9 |
P. Kocher, "Timing attacks on implementation of Diffie-Hellman." Crypto'96, LNCS 1109, pp. 104-113, Springer-Verlag, 1996.
|
10 |
L. Hemme, ''A Differential Faut Aanalysis against Early Rounds of (Triple)-DES," CHES'04, LNCS 3156, pp. 254-267, Springer- Verlag, 2004.
|
11 |
하재철, 김창균, 문상재, 박일환, "SEED에 대한 오류 분석 공격", 한국정보보호학회 동계정보보호학술대회 논문집(CISC-W'04), pp. 39-44, 2004년 12월.
|
12 |
E. Biham and A. Shamir, "Differential Faut Analysis of Secret Key Cryptosystems," Crypto'97, LNCS 1294, pp. 513-525, Springer-Verlag, 1997.
|
13 |
E. Biham and A. Shamir, "Differential Cryptanalysis of DES-like Cryptosystem," Journal of Cryptology, Vol. 4, No.1, pp. 3-72, Springer-Verlag, Jan. 1991.
DOI
|