1 |
Feng, Zhao, and Leonidas Guibas, "Wireless Sensor Networks," Elsevier, 2004.
|
2 |
김시관, 신윤식, 임은기, "이동 임시 무선망에서의 키관리 기법에 관한 연구," 한국산업정보학회논문지 Vol. 9, No. 4, pp.90-98, 2004.
|
3 |
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," Advances in Cryptology, Proc.Crypto' 99, pp.388-397, 1999.
|
4 |
B. Gierlichs, L. Batina, C. Clavier, T. Eisenbarth, A. Gouget, Helena H, T. Kasper, K .Lemkerust, S. Mangard, A. Moradi and E. Oswald, "Susceptible of eSTREAM Candidates towards Side Channel Analysis," Proc.SASC 2008 - Candidate of the Art of Stream Ciphers, 2008.
|
5 |
박준철, "HC-256 스트림 암호화를 이용한 범용성 및 확장성을 가진 DRM 기법 설계," 한국통신학회논문지, Vol. 32, No. 9, pp. 923-930, 2009.
|
6 |
H. Wu, "The Stream Cipher HC-128," Proc.New Stream Cipher Desings, pp.39-47, 2008.
|
7 |
Natioanl Institute of Standars and Technology, "Secure Hash Standard (SHS)," FIPS PUB 180-4, 2012.
|
8 |
이훈재, 최희봉, 이상곤, "블록 형태 암호에서의 DPA 방어기술 연구," 한국산업정보학회논문지, Vol. 7, No. 4, pp.1-8, 2002.
과학기술학회마을
|
9 |
C. Rechberger, E. Oswald, "Stream Ciphers and Side Channel analysis," In Proceedings of SASC 2004 - The State of the Art of Stream Ciphers 2004, pp.320-326, 2004.
|
10 |
Keke Wu, Huiyun Li, Bo Peng, and Fengqi Yu,, "Correlation Power Analysis Attack against Synchronous Stream Ciphers," Proc.ICYCS'08, pp.2067-2072, 2008.
|
11 |
배기석, 안만기, 박제훈, 이훈재, 문상재, "스트림 암호 Rabbit에 대한 전력분석 공격," 정보보호학회논문지, Vol. 21, No. 3, pp. 27-36, 2011.
과학기술학회마을
|
12 |
K. S. Bae, M. K. Ahn, H. J. Lee, S. J. Moon, "Practical Side Channel Analysis Attacks on the Stream Cipher Salsa20/12," In Proceedings of ITC-CSCC 2011, pp. 835-838, 2011.
|
13 |
J. Lano, N. Mentens, B. Prenell and I. Verbauwhede, "Power Analysis of Synchronous Stream Ciphers with Resynchronization Mechanism," The State of the Art of Stream Cipher, Proc. SASC'04, pp.327-333, 2004.
|