Side Channel Cryptanalysis of Product Ciphers (1998)

by John Kelsey , Bruce Schneier , David Wagner , Chris Hall
Venue:JOURNAL OF COMPUTER SECURITY
Citations:80 - 7 self

Active Bibliography

54 Twofish: A 128-Bit Block Cipher – Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson - 1998
4 Linear cryptanalysis of substitution-permutation networks – Liam Keliher - 2003
4 Statistical Cryptanalysis of Block Ciphers – Pascal Junod - 2004
15 Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers – Ramesh Karri, Kaijie Wu, Piyush Mishra, Yongkook Kim - 2002
54 Investigations of power analysis attacks on smartcards – Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sloan, Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sloan - 1999
35 Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps – Goce Jakimoski, Ljupčo Kocarev, Senior Member - 2001
4 Concurrent Error Detection of Fault-Based Side-Channel Cryptanalysis of 128-Bit Symmetric Block Ciphers – Ramesh Karri, Kaijie Wu, Piyush Mishra - 2001
Codes -- The Guide to Secrecy . . . – Richard A. Mollin
26 Private Circuits II: Keeping Secrets In Tamperable Circuits – Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David Wagner - 2006
69 Private Circuits: Securing Hardware against Probing Attacks – Yuval Ishai, Amit Sahai, David Wagner - 2003
10 Recent Developments in the Design of Conventional Cryptographic Algorithms – Bart Preneel, Vincent Rijmen, Antoon Bosselaers - 1998
15 Serpent: A Flexible Block Cipher With Maximum Assurance – Ross Anderson, Eli Biham, Lars Knudsen - 1998
2 Key Schedule Weaknesses in SAFER+ – John Kelsey, Bruce Schneier, David Wagner - 1999
217 Differential Fault Analysis of Secret Key Cryptosystems – Eli Biham, Adi Shamir - 1997
Chapter 1—Foundations 1.1 Terminology – Bruce Schneier, Wiley Computer Publishing, John Wiley, Whitfield Diffie
unknown title – Foreword Whitfield Diffie
27 On the Security of PKCS #11 – Jolyon Clulow - 2003
Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions – Juan M. Estevez-tapiador, Julio C. Hernandez-castro, Pedro Peris-lopez, Arturo Ribagorda
4 Key-schedule cryptanalysis of idea, g-des, gost, safer and triple-des – John Kelsey, Bruce Schneier, David Wagner - 1996