S-box hiding methods for AES hardware chips against differential power analysis based on composite field
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Jae Seong | - |
dc.contributor.author | Kim, Yongmin | - |
dc.contributor.author | Kim, Dong Kyue | - |
dc.date.accessioned | 2022-12-20T10:44:28Z | - |
dc.date.available | 2022-12-20T10:44:28Z | - |
dc.date.created | 2022-09-16 | - |
dc.date.issued | 2010-12 | - |
dc.identifier.issn | 0000-0000 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/173303 | - |
dc.description.abstract | AES has been widely used in cryptographic modules of many hardware devices such as communication chips or broadcasting receiver chips. AES may be theoretically safe; however, cryptographic device with it is vulnerable to side channel attacks such as differential power attacks due to leakage information. In this paper, we propose countermeasure techniques for AES hardware chips with S-box hiding using four different implementations of S-boxes using composite fields. We synthesized them and verified correlations roughly. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE | - |
dc.title | S-box hiding methods for AES hardware chips against differential power analysis based on composite field | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Dong Kyue | - |
dc.identifier.doi | 10.1109/ICNIDC.2010.5657888 | - |
dc.identifier.scopusid | 2-s2.0-78651271777 | - |
dc.identifier.bibliographicCitation | Proceedings - 2010 2nd IEEE International Conference on Network Infrastructure and Digital Content, IC-NIDC 2010, pp.778 - 782 | - |
dc.relation.isPartOf | Proceedings - 2010 2nd IEEE International Conference on Network Infrastructure and Digital Content, IC-NIDC 2010 | - |
dc.citation.title | Proceedings - 2010 2nd IEEE International Conference on Network Infrastructure and Digital Content, IC-NIDC 2010 | - |
dc.citation.startPage | 778 | - |
dc.citation.endPage | 782 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | AES | - |
dc.subject.keywordPlus | Countermeasure | - |
dc.subject.keywordPlus | Differential power attack | - |
dc.subject.keywordPlus | Hiding | - |
dc.subject.keywordPlus | S-box | - |
dc.subject.keywordPlus | Signal receivers | - |
dc.subject.keywordPlus | Cryptography | - |
dc.subject.keywordAuthor | AES | - |
dc.subject.keywordAuthor | Countermeasure | - |
dc.subject.keywordAuthor | Differential power attack | - |
dc.subject.keywordAuthor | Hiding | - |
dc.subject.keywordAuthor | S-box | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/5657888 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.