모듈라 곱셈의 충돌 입력에 기반한 부채널 공격 및 대응책

논문상세정보
' 모듈라 곱셈의 충돌 입력에 기반한 부채널 공격 및 대응책' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 전자공학
  • exponentiationalgorithm
  • inputcollision-basedcpa
  • modularmultiplication
  • power analysis attack
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
2,323 0

0.0%

' 모듈라 곱셈의 충돌 입력에 기반한 부채널 공격 및 대응책' 의 참고문헌

  • “The doubling attack- why upwards is better than downwards,”CHES'03
    P. Fouque LNCS 2779 : 269 ~ 280 [2003]
  • “Square Always exponentiation,”INDOCRYPT’11
    C. Clavier LNCS 7107 : 40 ~ 57 [2011]
  • “Resistance against differential power analysis for elliptic curve cryptosystems,”CHES'99
    J. Coron LNCS 1717 : 292 ~ 302 [1999]
  • “Relative doubling attack against Montgomery ladder,” ICISC'05
    S. Yen LNCS 3935 : 117 ~ 128 [2005]
  • “On the Importance of checking cryptographic protocols for faults," EUROCRYPTO'97
    D. Boneh LNCS 1233 : 37 ~ 51 [1997]
  • “Differential power analysis," CRYPTO'99
    P. Kocher LNCS 1666 : 388 ~ 397 [1999]
  • “A countermeasure against one physical cryptanalysis may benefit another attack,”ICISC’01
    S. Yen LNCS 2288 : 414 ~ 427 [2001]
  • Timing Attacks on Implementation of Diffie-Hellman, RSA, DSS, and other systems, CRYPTO'96
    P. Kocher LNCS 1109 : 104 ~ 113 [1996]
  • The Montgomery Powering Ladder, CHES'02
    M. Joye LNCS 2523 : 291 ~ 302 [2002]
  • The Art of Programming, Vol 2: Seminumerical Algorithms
    D. Knuth Addison-Wesley [1981]
  • Side-channel analysis on blinded regular scalar multiplications
    B. Feix [2014]
  • Passive and Active Combined Attacks: Combining fault attacks and side channel analysis
    F. Amiel FDTC'07, IEEE-CS : 92 ~ 102 [2007]
  • New directions in cryptography
    W Diffie IEEE Transactions on Information Theory IT-22 (6) : 644 ~ 654 [1976]
  • Modular multipli cation without trial division
    P. Montgomery Math. of Comp. 44 (170) : 519 ~ 521 [1985]
  • CRT-RSA Algorithm Protected Against Fault Attacks, WISTP'07
    A. Boscher LNCS 4462 : 237 ~ 252 [2007]
  • BNP 멱승 알고리듬에 대한 물리적인 조합 공격 및 대응책
    김형동 정보보호학회논문지 23 (4) : 585 ~ 591 [2013]
  • Advanced Encryption Standards
  • A survey of fast exponentiation methods
    D. Gordon Journal of Algorithms 27 : 129 ~ 146 [1998]
  • A method for obtaining digital signature and public-key cryptosystems
    R. Rivest Comm. of the ACM 21 : 120 ~ 126 [1978]
  • A New Exponentiation Algorithm Resistant to Combined Side Channel Attack
    H. Kim Journal of Internet Services and Information Security 3 (3/4) : 17 ~ 27 [2013]