최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.30 no.6, 2020년, pp.1263 - 1270
김주환 (국민대학교 수학과) , 이종혁 (국민대학교 금융정보보안학과) , 한동국 (국민대학교 금융정보보안학과)
The differential fault attacks (DFA) are cryptoanalysis methods that reveal the secret key utilizing differences between the normal and faulty ciphertexts, which occurred when artificial faults are injected into an encryption device. The conventional DFA methods use faults to falsify intermediate va...
D. Boneh, R. DeMillo, and R. Lipton., "On the importance of checking cryptographic protocols for faults," Advances in Cryptology, EUROCRYPT'97, LNCS 1233, pp. 37-51, May. 1997.
O. Kommerling and M. Kuhn, "Design principles for tamper-resistant smart-card processors," Proceedings of the 1st Workshop on Smartcard Technology, pp. 9-20, May. 1999.
E. Biham and A. Shamir, "Differential fault analysis of secret key cryptosystems," Advances in Cryptology, CRYPTO'97, LNCS 1294, pp. 513-525, Aug, 1997.
J. Schmidt and C. Herbst, "A practical fault attack on square and multiply," Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 53-58, Aug. 2008.
D. Kumar, S. Patranabis, J. Breier, D. Mukhopadhyay, S. Bhasin, A. Chattopadhyay, and A. Baksi "A practical fault attack on ARX-like ciphers with a case study on ChaCha20," Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 33-40, Sep. 2017.
M. Dworkin, E. Barker, J. Nechvatal, J. Foti, L. Bassham, E. Roback, and J. Dray Jr., "Advanced Encryption Standard (AES)," NIST FIPS 197, Nov. 2001.
H. Choukri and M. Tunstall, "Round reduction using faults," Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 13-24, Sep. 2005.
J. Blomer and JP. Seifert, "Fault based cryptanalysis of the Advanced Encryption Standard (AES)," financial cryptography, LNCS 2742, pp. 162-181, Jan. 2003.
C. Chen and S. Yen, "Differential fault analysis on AES key schedule and Some countermeasures," Australasian Conference on Information Security and Privacy, LNCS 2727. pp. 118-129, Jul. 2003.
J. Breier, D. Jap, and C. Chen, "Laser profiling for the back-side fault attacks: with a practical laser skip Instruction attack on AES," Worksohp on Cyber-Physical System Security, pp. 99-103, Apr. 2015.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.