參考文獻 |
[1] Michel Abdalla and David Pointcheval. Simple password-based encrypted key exchange protocols. In Alfred Menezes, editor, Topics in Cryptology – CTRSA 2005, volume 3376 of Lecture Notes in Computer Science, pages 191–208. Springer, 2005.
[2] Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, and Pankaj Rohatgi. The EM side channel(s). In Burton S. Kaliski Jr., C¸ etin Kaya Ko¸c, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems – CHES 2002,
volume 2523 of Lecture Notes in Computer Science, pages 29–45. Springer, 2003.
[3] MahnKi Ahn, JaeCheol Ha, Hoon Jae Lee, and Sang-Jae Moon. A random m-ary method based countermeasure against side channel attacks. In Vipin Kumar, Marina L. Gavrilova, Chih Jeng Kenneth Tan, and Pierre L’Ecuyer, editors, Computational Science and Its Applications – ICCSA 2003, volume 2668 of Lecture Notes in Computer Science, pages 338–347. Springer, 2003.
[4] Toru Akishita and Tsuyoshi Takagi. Zero-value register attack on elliptic curve cryptosystem. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, E88-A(1):132–139, 2005.
[5] Frederic Amiel and Benoit Feix. On the BRIP algorithms security for RSA. In Jose Antonio Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, and Constantinos Markantonakis, editors, Information Security Theory and
Practices – WISTP 2008, volume 5019 of Lecture Notes in Computer Science, pages 136–149. Springer, 2008.
[6] Giuseppe Ateniese and Breno de Medeiros. Identity-based chameleon hash and applications. In Ari Juels, editor, Financial Cryptography – FC 2004, vol. 3110 of Lecture Notes in Computer Science, pages 164–180. Springer, 2004.
[7] Giuseppe Ateniese and Breno de Medeiros. On the key exposure problem in chameleon hashes. In Carlo Blundo and Stelvio Cimato, editors, Security in Communication Networks – SCN 2004, vol. 3352 of Lecture Notes in Computer
Science. pages 165–179. Springer, 2005.
[8] Mihir Bellare and Phillip Rogaway. Optimal asymmetric encryption padding –How to encrypt with RSA. In Alfredo De Santis, editor, Advances in Cryptology– EUROCRYPT’94, volume 950 of Lecture Notes in Computer Science, pages
92–111. Springer, 1995.
[9] Mihir Bellare and Phillip Rogaway. The exact security of digital signatures: How to sign with RSA and Rabin. In Ueli M. Maurer, editor, Advances in Cryptology – EUROCRYPT’96, volume 1070 of Lecture Notes in Computer Science, pages 399–416. Springer, 1996.
[10] Ingrid Biehl, Bernd Meyer, and Volker M¨uller. Differential fault attacks on elliptic curve cryptosystems. In Mihir Bellare, editor, Advances in Cryptology – CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 131–146. Springer, 2000.
[11] Bert den Boer, Kerstin Lemke, and Guntram Wicke. A DPA attack against the modular reduction within a CRT implementation of RSA. In Burton S. Kaliski Jr., C¸ etin Kaya Ko¸c, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems – CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages 228–243. Springer, 2003.
[12] Eric Brier, Christophe Clavier, and Francis Olivier. Correlation power analysis with a leakage model. In Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems – CHES 2004, volume 3156 of
Lecture Notes in Computer Science, pages 16–29. Springer, 2004.
[13] Mathieu Ciet and Marc Joye. Elliptic curve cryptosystem in the presence of permanent and transient faults. Designs, Codes and Cryptography, 36(1):33–
43, 2005.
[14] Jean-S´ebastien Coron. Resistance against differential power analysis for elliptic curve cryptosystems. In C¸ etin Kaya Ko¸c and Christof Paar, editors, Cryptographic Hardware and Embedded Systems – CHES ’99, volume 1717 of Lecture Notes in Computer Science, pages 292–302. Springer, 1999.
[15] Benoˆıt Chevallier-Mames, Mathieu Ciet, and Marc Joye. Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity. IEEE Transactions
on Computers, 53(6):760–768, 2004.
[16] Whitfield Diffie and Martin E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 26(6):644–654, 1976.
[17] Nevine Maurice Ebeid and M. Anwar Hasan. On randomizing private keys to counteract DPA attacks. In Mitsuru Matsui and Robert J. Zuccherato, editors,
Selected Areas in Cryptography – SAC 2003, volume 3006 of Lecture Notes in Computer Science, pages 58–72. Springer, 2004.
[18] Taher ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4):469–472, 1985.
[19] Pierre-Alain Fouque and Fr´ed´eric Valette. The doubling attack – why upwards is better than downwards. In Colin D. Walter, C¸ etin Kaya Ko¸c, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems – CHES 2003, volume 2779 of Lecture Notes in Computer Science, pages 269–280. Springer, 2003.
[20] Pierre-Alain Fouque, Gwena¨elle Martinet, and Guillaume Poupard. Attacking unbalanced RSA-CRT using SPA. In Colin D. Walter, C¸ etin Kaya Ko¸c, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems –
CHES 2003, volume 2779 of Lecture Notes in Computer Science, pages 254–268. Springer, 2003.
[21] Pierre-Alain Fouque, Fr´ed´eric Muller, Guillaume Poupard, and Fr´ed´eric Valette. Defeating countermeasures based on randomized BSD representations. In Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems – CHES 2004, volume 3156 of Lecture Notes in Computer Science, pages 312–327. Springer, 2004.
[22] Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, and Jacques Stern. RSA-OAEP is secure under the RSA assumption. Journal of Cryptology, 17(2):81–104, 2004.
[23] Harvey L. Garner. The residue number system. IRE Transactions on Electronic Computers, EC-8(6):140–147, 1959.
[24] Louis Goubin. A refined power-analysis attack on elliptic curve cryptosystems. In Yvo Desmedt, editor, Public Key Cryptography – PKC 2003, volume 2567 of Lecture Notes in Computer Science, pages 199–210. Springer, 2003.
[25] JaeCheol Ha and Sang-Jae Moon. Randomized signed-scalar multiplication of ECC to resist power attacks. In Burton S. Kaliski Jr., C¸ etin Kaya Ko¸c, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems –CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages 551–563.Springer, 2003.
[26] Dong-guk Han, Tetsuya Izu, and Tsuyoshi Takagi. Some explicit formulae of NAF and its left-to-right analogue. Cryptology ePrint Archive, Report 2005/384. Available at http://eprint.iacr.org/2005/384.
[27] Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim, Yoon Sung Hwang, Beomin Kim, and Young-Ho Park. Enhanced exhaustive search attack on randomized BSD type countermeasure. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E89-A(5):1316–1327, 2006.
[28] Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, and Adi Shamir. Comparative Power Analysis of Modular Exponentiation Algorithms. IEEE Transactions on Computers, 59(6):795–807, 2010.
[29] Kai Hwang. Computer arithmetic: principles, architecture and design. Reading, John Wiley & Sons Inc, 1979.
[30] ISO/IEC 15946-4, Information technology - Security techniques – Cryptographic techniques based on elliptic curves - Part 4: Digital signatures giving message
recovery.
[31] Marc Joye and Sung-Ming Yen. Optimal left-to-right binary signed-digit recoding. IEEE Transactions on Computers, 49(7):740–748, 2000.
[32] Marc Joye and Christophe Tymen. Protections against differential analysis for elliptic curve cryptography – an algebraic approach. In C¸ etin Kaya Ko¸c, David
Naccache, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems – CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 377–390. Springer, 2001.
[33] Anton Kargl and G¨otz Wiesend. On randomized addition-subtraction chains to counteract differential power attacks. In Javier Lopez, Sihan Qing, and Eiji Okamoto, editors, Information and Communications Security – ICICS 2004, volume 3269 of Lecture Notes in Computer Science, pages 278–290. Springer, 2004.
[34] Chris Karlof and David Wagner. Hidden Markov model cryptanalysis. In Colin D. Walter, C¸ etin Kaya Ko¸c, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems – CHES 2003, volume 2779 of Lecture Notes in
Computer Science, pages 17–34. Springer, 2003.
[35] Neal Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48(177):203–209, 1987.
[36] Paul C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Neal Koblitz, editor, Advances in Cryptology – CRYPTO ’96, volume 1109 of Lecture Notes in Computer Science, pages 104–113. Springer, 1996.
[37] Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Introduction to differential power analysis and related attacks, 1998. Available at http://www.cryptography.com/.
[38] Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential power analysis. In Michael J. Wiener, editor, Advances in Cryptology – CRYPTO ’99, volume 1666 of Lecture Notes in Computer Science, pages 388–397. Springer, 1996.
[39] Juliane Kr¨amer, Dmitry Nedospasov, and Jean-Pierre Seifert. Weaknesses in current RSA signature schemes. In Howon Kim, editor, Information Security and Cryptology – ICISC 2011, volume 7259 of Lecture Notes in Computer
Science, pages 155–168. Springer, 2012.
[40] Yuan-Han Kuo. The research of power analysis against AES. Master’s thesis, National Central University, Taiwan, R.O.C., 2004.
[41] Kerstin Lemke, Kai Schramm, and Christof Paar. DPA on n-bit sized boolean and arithmetic operations and its application to IDEA, RC6, and the HMACconstruction. In Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic
Hardware and Embedded Systems – CHES 2004, volume 3156 of Lecture Notes in Computer Science, pages 205–219. Springer, 2004.
[42] Pierre-Yvan Liardet and Nigel P. Smart. Preventing SPA/DPA in ECC systems using the Jacobi form. In C¸ etin Kaya Ko¸c, David Naccache, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems – CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 391–401. Springer, 2001.
[43] Hideyo Mamiya, Atsuko Miyaji, and Hiroaki Morimoto. Efficient countermeasure against RPA, DPA, and SPA. In Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems – CHES 2004, volume 3156 of Lecture Notes in Computer Science, pages 343–356. Springer, 2004.
[44] Hideyo Mamiya, Atsuko Miyaji, and Hiroaki Morimoto. Secure elliptic curve exponentiation against RPA, ZRA, DPA, and SPA. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, E89-A(8):2207–2215, 2006.
[45] Stefan Mangard, Elisabeth Oswald, and Thomas Popp. Power analysis attacks, revealing the secrets of smart cards, Reading ISBN: 978-0-387-30857-9. Springer, 2007.
[46] Alfred Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography, Reading ISBN: 0-8493-8523-7. CRC Press, 1996.
[47] Thomas S. Messerges, Ezzy A. Dabbish, and Robert H. Sloan. Power analysis attacks of modular exponentiation in smartcards. In C¸ etin Kaya Ko¸c and Christof Paar, editors, Cryptographic Hardware and Embedded Systems –
CHES ’99, volume 1717 of Lecture Notes in Computer Science, pages 144–157. Springer, 1999.
[48] Victor S. Miller. Use of elliptic curves in cryptography. In Hugh C. Williams, editor, Advances in Cryptology – CRYPTO’85, volume 218 of Lecture Notes in
Computer Science, pages 417–426. Springer, 1986.
[49] Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh. Enhanced power analysis attack using chosen message against RSA hardware implementations. In Proc. of International Symposium on Circuits and Systems –
ISCAS 2008, pages 3282–3285. IEEE, 2008.
[50] Peter Montgomery. Modular multiplication without trial division. Mathematics of Computation, 44(170):519–521, 1985.
[51] Fran¸cois Morain and Jorge Olivos. Speeding up the computation on an elliptic curve using addition-subtraction chains. Theoretical Informatics and Applications,
44:531–544, 1990.
[52] James A. Muir and Douglas R. Stinson. Minimality and other properties of the width-w nonadjacent form. Mathematics of Computation, 75(253):369–384,
2006.
[53] James A. Muir and Douglas R. Stinson. Alternative digit sets for nonadjacent representations. In Mitsuru Matsui and Robert J. Zuccherato, editors, Selected
Areas in Cryptography – SAC 2003, volume 3006 of Lecture Notes in Computer Science, pages 306–319. Springer, 2004.
[54] National Institute of Standards and Technology (NIST). FIPS PUB 186-2: digital signature standard (DSS), January 2000. Available at http://csrc.nist.gov/publications/fips/archive/fips186-2/fips186-2.pdf
[55] National Institute of Standards and Technology (NIST). FIPS PUB 46-3: data encryption standard (DES), October 1999. Available at http://csrc.nist.gov/publications/fips/archive/fips46-3/fips46-3.pdf
[56] Roman Novak. SPA-based adaptive chosen-ciphertext attack on RSA implementation. In David Naccache and Pascal Paillier, editors, Public Key Cryptography– PKC 2002, volume 2274 of Lecture Notes in Computer Science, pages
252–262. Springer, 2002.
[57] Katsuyuki Okeya and Kouichi Sakurai. On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between
addition and doubling. In Lynn Margaret Batten and Jennifer Seberry, editors, Information Security and Privacy – ACISP 2002, volume 2384 of Lecture Notes in Computer Science, pages 420–435. Springer, 2002.
[58] Katsuyuki Okeya and Dong-Guk Han. Side channel attack on Ha-Moon’s countermeasure of randomized signed scalar multiplication. In Thomas Johansson and Subhamoy Maitra, editors, Progress in Cryptology – INDOCRYPT 2003, volume 2904 of Lecture Notes in Computer Science, pages 334–348. Springer, 2003.
[59] Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, and Tsuyoshi Takagi. Signed binary representation revisited. In Matthew K. Franklin, editor, Advances in Cryptology – CRYPTO 2004, volume 3152 of Lecture Notes in
Computer Science, pages 123–139. Springer, 2004.
[60] Elisabeth Oswald and Manfred Josef Aigner. Randomized addition-subtraction chains as a countermeasure against power attacks. In C¸ etin Kaya Ko¸c, David Naccache, and Christof Paar, editors, Cryptographic Hardware and Embedded
Systems – CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 39–50. Springer, 2001.
[61] Public-Key Cryptography Standards, PKCS#1: RSA Cryptography Standard, RSA Laboratories. http://www.rsa.com/rsalabs/node.asp?id=2125
[62] Public-Key Cryptography Standards, PKCS#2.1: RSA Cryptography Standard, RSA Laboratories. http://www.rsasecurity.com/rsalabs/pkcs/
[63] Jean-Jacques Quisquater and C. Couvreur. Fast decipherment algorithm for the RSA public-key cryptosystem. IEEE Electronics Latters, 18(21):905–907, 1982.
[64] Jean-Jacques Quisquater and David Samyde. Electromagnetic analysis (EMA): measures and countermeasures for smart cards. In Isabelle Attali and Thomas P. Jensen, editors, Smart Card Programming and Security – E-smart 2001, volume 2140 of Lecture Notes in Computer Science, pages 200–210. Springer, 2001.
[65] George W. Reitwiesner. Binary arithmetic. Advances in Computers, 1:231–308, 1960.
[66] Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120–126, 1978.
[67] Claus-Peter Schnorr. Efficient signature generation by smart cards. Journal of Cryptography, 4(3):161–174, 1991.
[68] Kai Schramm, Thomas J. Wollinger, and Christof Paar. A new class of collision attacks and its application to DES. Fast Software Encryption – FSE 2003, volume 2887 of Lecture Notes in Computer Science, pages 206–222. Springer,
2003.
[69] Adi Shamir. Method and apparatus for protecting public key schemes from timing and fault attacks. United States Patent #5,991,415, November 23, 1999. Also presented at the rump session of EUROCRYPT 1997.
[70] Jong Hoon Shin, Dong Jin Park, and Pil Joong Lee. DPA attack on the improved Ha-Moon algorithm. In JooSeok Song, Taekyoung Kwon, and Moti Yung, editors, Information Security Applications – WISA 2005, volume 3786 of Lecture Notes in Computer Science, pages 283–291. Springer, 2006.
[71] Sang Gyoo Sim, Dong Jin Park, and Pil Joong Lee. New power analysis on the Ha-Moon algorithm and MIST algorithm. In Javier Lopez, Sihan Qing, and Eiji Okamoto, editors, Information and Communications Security – ICICS 2004,
volume 3269 of Lecture Notes in Computer Science, pages 291–304, Springer, 2004.
[72] Nigel P. Smart. An analysis of Goubin’s refined power analysis attack. In Colin D. Walter, C¸ etin Kaya Ko¸c, and Christof Paar, editors, Cryptographic Hardware
and Embedded Systems – CHES 2003, volume 2779 of Lecture Notes in Computer Science, pages 281–290. Springer, 2003.
[73] Victor Shoup. OAEP reconsidered. Journal of Cryptology, 15(4):223–249, 2002.
[74] Standards for Efficient Cryptography Group (SECG). Specification of Standards for Efficient Cryptography, Version 1.0, 2000. Available at http://www.secg.org/secg docs.htm
[75] Transparency Market Research. Smart card market – Global industry analysis, size, share, growth, trends, and forecast, 2012–2018. Report 2011. Available at
http://www.transparencymarketresearch.com/smart-card.html
[76] Wireless Application Protocol (WAP) Forum. Wireless Transport Layer Security (WTLS) Specification. Available at http://www.wapforum.org
[77] Marc F. Witteman. A DPA attack on RSA in CRT mode. Riscure Technical Report. Available at http://www.riscure.com/fileadmin/images/Docs/DPA attack on RSA in CRT mode.pdf.
[78] Marc F. Witteman, Jasper G. J. van Woudenberg, and Federico Menarini. Defeating RSA multiply-always and message blinding countermeasure. In Aggelos
Kiayias, editor, Topics in Cryptology – CT-RSA 2011, volume 6558 of Lecture Notes in Computer Science, pages 77–88. Springer, 2011.
[79] Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, and JaeCheol Ha. Improvement on Ha-Moon randomized exponentiation algorithm. In Choonsik Park and
Seongtaek Chee, editors, Information Security and Cryptology – ICISC 2004, volume 3506 of Lecture Notes in Computer Science, pages 154–167. Springer, 2005.
[80] Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, and JaeCheol Ha. Power analysis by exploiting chosen message and internal collisions – Vulnerability of checking mechanism for RSA-decryption. In Ed Dawson and Serge Vaudenay, editors, Progress in Cryptology – Mycrypt 2005, volume 3715 of Lecture Notes in Computer Science, pages 183–195. Springer, 2005. |