- 요약
- ABSTRACT
- Ⅰ. 서론
- Ⅱ. 마스킹 기반 2차 CPA 공격
- Ⅲ. 기존의 사전처리함수와 제안하는 사전처리함수

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
https://www.riss.kr/link?id=A82413889
2010
Korean
567
KCI등재
학술저널
1369-1380(12쪽)
0
0
상세조회0
다운로드목차 (Table of Contents)
참고문헌 (Reference)
1 T.Messerges, "Using Second-Order Power Analysis to Attack DPA Resistant Software" Springer- Verlag 238-251, 2004
2 T.Messerges, "Using Second-Order Power Analysis to Attack DPA Resistant Software" Springer- Verlag 238-251, 2004
3 S. Chari, "Towards Sound Approaches to Counteract Power-Analysis Attacks" Springer-Verlag 398-412, 1999
4 J. Waddle, "Towards Efficient Second-Order Power Analysis" Springer-Verlag 1-15, 2004
5 Prouff, E, "Statistical Analysis of Second Order Differential Power Analysis"
6 E. Trichina, "Simplified adaptive multiplicative masking for AES" Springer-Verlag 187-197, 2003
7 John Kelsey, "Side Channel Cryptanlysis of Product Cipher" Springer-Verlag 115-126, 1997
8 John Kelsey, "Side Channel Cryptanlysis of Product Cipher"
9 T. S. Messerges, "Securing the AES finalists against power analysis attacks" Springer-Verlag 150-164, 2000
10 J. Blomer, "Provably secure masking of AES" 69-83, 2004
1 T.Messerges, "Using Second-Order Power Analysis to Attack DPA Resistant Software" Springer- Verlag 238-251, 2004
2 T.Messerges, "Using Second-Order Power Analysis to Attack DPA Resistant Software" Springer- Verlag 238-251, 2004
3 S. Chari, "Towards Sound Approaches to Counteract Power-Analysis Attacks" Springer-Verlag 398-412, 1999
4 J. Waddle, "Towards Efficient Second-Order Power Analysis" Springer-Verlag 1-15, 2004
5 Prouff, E, "Statistical Analysis of Second Order Differential Power Analysis"
6 E. Trichina, "Simplified adaptive multiplicative masking for AES" Springer-Verlag 187-197, 2003
7 John Kelsey, "Side Channel Cryptanlysis of Product Cipher" Springer-Verlag 115-126, 1997
8 John Kelsey, "Side Channel Cryptanlysis of Product Cipher"
9 T. S. Messerges, "Securing the AES finalists against power analysis attacks" Springer-Verlag 150-164, 2000
10 J. Blomer, "Provably secure masking of AES" 69-83, 2004
11 S. Mangard, "Power Analysis Attacks: Revealing the Secrets of Smart Cards"
12 M. Joye, "On Second-Order Differential Power Analysis" Springer- Verlag 293-308, 2005
13 J. D. Golic, "Multiplicative masking and power analysis of AES" Springererlag 2523 : 198-212, 2002
14 T. Messerges, "Method and apparatus for preventing information leakage attacks on a microelectronic assembly"
15 C. Clavier, "Differential power analysis in the presence of hardware countermeasures" Springer-Verlag 1965 : 252-263, 2000
16 P. Kocher, "Differential Power Analysis" Springer-Verlag 388-397, 1999
17 E. Brier, "Correlation power analysis with a leakage model" 16-29, 2004
18 E.Trichina, "Combinational logic design for AES subbyte transformation on masked data" Cryptology ePrint Archive 2003
19 M. L. Akkar, "An Implementation of DES and AES,Secure against Some Attacks" Springer-Verlag 2162 : 309-318, 2001
20 E. Oswald, "A side-channel analysis resistant description of the AES S-box" Springererlag 413-423, 2005
21 K. Tiri, "A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation" 246-251, 2004
22 K. Tiri, "A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards" 2002
페이로드 시그니처 기반 트래픽 분석 시스템의 성능 향상
저장 공간 및 연산 효율적인 RFID 경계 결정 프로토콜
학술지 이력
| 연월일 | 이력구분 | 이력상세 | 등재구분 |
|---|---|---|---|
| 2015-01-01 | 평가 | 학술지 통합(등재유지) | |
| 2014-11-07 | 학술지명변경 | 한글명 : 한국통신학회논문지B</br>외국어명 : The Journal of Korean Institute of Communications and Information Sciences B | ![]() |
| 2014-08-08 | 학술지명변경 | 한글명 : 한국통신학회논문지B</br>외국어명 : The Journal of the Korean Institute of Communication Science B | ![]() |
| 2003-01-01 | 평가 | 등재학술지 선정(등재후보2차) | ![]() |
| 2001-01-01 | 평가 | 등재후보학술지 선정(신규평가) | ![]() |