Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Countermeasure techniques for seed hardware modules against differential power analysis

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Yongmin-
dc.contributor.authorLee, Jae Seong-
dc.contributor.authorKim, Dong Kyue-
dc.date.accessioned2022-12-20T10:45:22Z-
dc.date.available2022-12-20T10:45:22Z-
dc.date.created2022-09-16-
dc.date.issued2010-12-
dc.identifier.issn0000-0000-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/173315-
dc.description.abstractSEED, the Korean standard block cipher algorithm, is a 128-bit symmetric key block cipher algorithm. Although SEED is theoretically safe, cryptographic devices with SEED modules are vulnerable to differential power analysis due to leakage information. Recently, differential power analysis has been widely researched, and various countermeasure techniques against differential power analysis have been proposed. In this paper, we embodied SEED hardware modules with differential power analysis countermeasure techniques using masking methods, and we generated random number using simple PRNG module. We embodied the SEED hardware modules using VHDL, and analyzed the result of simulation and synthesis.-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE-
dc.titleCountermeasure techniques for seed hardware modules against differential power analysis-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Dong Kyue-
dc.identifier.doi10.1109/ICNIDC.2010.5657883-
dc.identifier.scopusid2-s2.0-78651309495-
dc.identifier.bibliographicCitationProceedings - 2010 2nd IEEE International Conference on Network Infrastructure and Digital Content, IC-NIDC 2010, pp.763 - 767-
dc.relation.isPartOfProceedings - 2010 2nd IEEE International Conference on Network Infrastructure and Digital Content, IC-NIDC 2010-
dc.citation.titleProceedings - 2010 2nd IEEE International Conference on Network Infrastructure and Digital Content, IC-NIDC 2010-
dc.citation.startPage763-
dc.citation.endPage767-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusBlock cipher algorithms-
dc.subject.keywordPlusCryptographic devices-
dc.subject.keywordPlusDifferential power Analysis-
dc.subject.keywordPlusHardware modules-
dc.subject.keywordPlusLeakage information-
dc.subject.keywordPlusPower analysis attack-
dc.subject.keywordPlusRandom Numbers-
dc.subject.keywordPlusSide channel attack-
dc.subject.keywordPlusSymmetric keys-
dc.subject.keywordPlusAlgorithms-
dc.subject.keywordPlusComputer hardware description languages-
dc.subject.keywordPlusCryptography-
dc.subject.keywordPlusRandom number generation-
dc.subject.keywordPlusSeed-
dc.subject.keywordAuthorDifferential power analysis-
dc.subject.keywordAuthorPower analysis attack-
dc.subject.keywordAuthorSEED-
dc.subject.keywordAuthorSide channel attack-
dc.identifier.urlhttps://ieeexplore.ieee.org/document/5657883-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 융합전자공학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Dong Kyue photo

Kim, Dong Kyue
COLLEGE OF ENGINEERING (SCHOOL OF ELECTRONIC ENGINEERING)
Read more

Altmetrics

Total Views & Downloads

BROWSE