Entry Hevia:1999:STD from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Hevia:1999:STD,
author = "Alejandro Hevia and Marcos Kiwi",
title = "Strength of Two {Data Encryption Standard}
Implementations under Timing Attack",
journal = j-TISSEC,
volume = "2",
number = "4",
pages = "416--437",
month = nov,
year = "1999",
CODEN = "ATISBQ",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Oct 26 11:39:38 MDT 2000",
bibsource = "http://www.acm.org/tissec/contents/v2no2.html;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
URL = "http://www.acm.org/pubs/citations/journals/tissec/1999-2-4/p416-hevia/",
abstract = "We study the vulnerability of two implementations of
the Data Encryption Standard (DES) cryptosystem under a
timing attack. A timing attack is a method, recently
proposed by Paul Kocher, that is designed to break
cryptographic systems. It exploits the engineering
aspects involved in the implementation of cryptosystems
and might succeed even against cryptosystems that
remain impervious to sophisticated cryptanalytic
techniques. A timing attack is, essentially, a way of
obtaining some users private information by carefully
measuring the time it takes the user to carry out
cryptographic operations. In this work, we analyze two
implementations of DES. We show that a timing attack
yields the Hamming weight of the key used by both DES
implementations. Moreover, the attack is
computationally inexpensive. We also show that all the
design characteristics of the target system, necessary
to carry out the timing attack, can be inferred from
timing measurements.",
acknowledgement = ack-nhfb,
fjournal = "ACM Transactions on Information and System Security",
generalterms = "Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
keywords = "cryptanalysis; cryptography; data encryption standard;
timing attack",
subject = "Data --- Data Encryption (E.3): {\bf Data encryption
standard (DES)**}; Computer Systems Organization ---
Special-Purpose and Application-Based Systems (C.3)",
}
Related entries
- against,
2(3)230,
2(4)354,
9(4)461,
10(3)11,
11(2)3,
11(3)13,
11(4)22,
12(3)18,
13(3)22,
13(3)28,
14(1)7,
14(1)13,
14(3)24,
15(1)3,
15(2)6,
15(2)8,
15(3)14,
16(1)1,
16(1)2,
16(2)8,
16(4)13,
17(1)4,
17(2)7,
17(2)8,
18(1)2,
18(2)7
- all,
1(1)93,
2(2)159,
2(3)332,
10(1)4,
10(2)5,
10(4)2,
10(4)4,
11(2)1,
11(2)3,
11(2)4,
11(2)5,
11(2)6,
11(3)13,
11(4)18,
11(4)20,
11(4)22,
12(2)10,
12(3)18,
13(1)10,
13(3)25,
13(3)28,
13(4)38,
13(4)41,
14(1)6,
14(1)14,
14(3)27,
15(1)4,
15(2)9,
15(3)14,
15(4)16,
15(4)17,
16(1)4,
17(1)2,
17(3)9,
17(3)11,
18(1)2,
18(2)5
- analyze,
2(3)230,
9(4)421,
10(1)4,
10(3)9,
10(4)5,
11(2)1,
11(2)3,
11(3)14,
11(3)15,
11(4)23,
12(3)16,
12(3)17,
13(3)27,
15(1)5,
15(2)8,
15(3)11,
16(3)10,
16(4)16,
16(4)17,
18(1)1,
18(1)2,
18(1)3,
18(2)5
- aspect,
2(1)105,
10(1)2,
10(3)11,
15(2)10,
16(3)10,
17(4)16
- both,
1(1)26,
1(1)93,
2(1)65,
9(2)181,
10(1)4,
10(3)12,
11(1)3,
11(1)4,
11(2)2,
11(3)14,
11(3)15,
11(3)16,
11(4)22,
12(1)2,
12(2)13,
12(3)15,
12(4)20,
13(4)30,
13(4)33,
14(3)24,
15(1)5,
15(2)10,
15(3)11,
15(3)13,
16(1)4,
16(2)5,
16(3)10,
16(4)17,
17(3)9,
18(1)1,
18(4)13,
18(4)14
- break,
12(2)13,
13(3)22,
13(4)41,
16(3)10
- carefully,
11(2)1,
12(3)17,
16(3)9
- carry,
2(3)230,
10(3)12,
12(2)11
- characteristic,
11(4)17,
12(2)13,
13(4)30,
13(4)32,
17(1)1,
18(4)12
- computationally,
2(2)159,
11(2)5,
15(2)9
- computer,
1(1)66,
2(1)34,
2(1)105,
2(2)159,
2(3)230,
2(3)269,
2(3)332,
2(4)354,
10(2)5,
11(4)20,
12(2)7,
13(2)11,
15(1)1,
15(2)9,
16(2)5,
17(2)6
- cryptanalysis,
11(4)17,
13(1)10
- cryptanalytic,
11(4)17
- cryptographic,
2(3)230,
2(4)354,
2(4)390,
9(2)181,
10(2)6,
10(3)10,
10(4)3,
11(3)12,
12(2)9,
13(1)2,
14(1)10,
14(1)11,
14(1)14,
15(1)3,
15(2)9,
16(1)2,
16(2)6,
17(2)7,
17(3)10,
18(1)3
- cryptography,
2(3)230,
10(3)10,
11(4)17,
14(1)14,
17(2)5
- cryptosystem,
11(2)4
- design,
1(1)66,
2(1)34,
2(1)105,
2(2)138,
2(3)269,
2(4)390,
10(2)7,
10(3)11,
10(4)1,
11(1)2,
11(2)1,
11(4)18,
11(4)23,
12(1)3,
12(2)8,
12(2)11,
12(3)17,
12(4)20,
12(4)22,
13(1)10,
13(4)29,
13(4)32,
14(1)8,
14(3)24,
15(3)13,
16(2)5,
16(2)6,
16(2)8,
16(4)16,
17(1)4,
17(2)7,
17(2)8,
17(4)13,
18(1)1,
18(1)3,
18(4)12
- designed,
10(3)10,
10(3)11,
10(3)12,
11(1)2,
11(3)12,
12(4)21,
12(4)22,
13(3)25,
13(4)38,
16(2)5,
16(2)8,
16(3)9,
16(3)10,
16(4)14,
17(4)13,
18(1)3
- encryption,
2(3)230,
6(3)365,
7(1)1,
7(2)206,
9(2)162,
9(3)325,
9(4)461,
10(2)6,
10(4)4,
11(2)4,
13(3)22,
13(4)31,
13(4)33,
13(4)35,
13(4)41,
16(1)2,
16(3)10,
17(2)6,
18(1)4,
18(3)10
- engineering,
2(2)177,
13(3)27,
18(1)3
- essentially,
11(2)4
- even,
1(1)66,
2(3)332,
10(1)2,
11(1)4,
11(2)6,
11(4)22,
12(2)11,
12(4)20,
13(1)10,
13(4)30,
13(4)35,
13(4)41,
14(3)25,
14(3)27,
15(1)5,
16(3)12,
17(3)11,
17(3)12,
18(1)1
- exploit,
12(1)1,
12(2)11,
12(4)22,
13(3)28,
15(1)2,
16(4)13,
17(1)1,
17(3)11
- Hamming,
16(1)2
- implementation,
1(1)3,
1(1)26,
1(1)66,
2(1)34,
2(2)177,
2(4)390,
7(2)319,
11(1)2,
11(1)3,
11(1)4,
11(3)16,
11(4)18,
11(4)22,
12(1)1,
12(2)10,
12(2)11,
12(3)14,
12(4)22,
13(1)4,
13(3)26,
13(3)27,
14(1)3,
15(1)3,
15(2)8,
15(3)13,
15(4)16,
16(1)1,
16(1)2,
16(3)9,
16(3)10,
16(3)11,
16(4)13,
17(2)5,
17(2)8,
18(1)2,
18(1)3,
18(1)4
- inexpensive,
11(2)2
- inferred,
10(4)2
- involved,
9(4)421,
10(1)4,
13(4)32,
16(4)14
- measurement,
10(4)4,
14(1)13,
15(4)17,
18(4)12
- measuring,
12(3)17
- method,
1(1)3,
1(1)26,
2(2)159,
2(3)295,
2(3)332,
9(3)259,
10(1)3,
10(3)10,
10(4)4,
10(4)5,
11(2)2,
11(3)16,
11(4)19,
11(4)22,
12(1)2,
12(1)6,
12(2)13,
12(3)16,
13(2)15,
13(4)35,
15(1)4,
15(2)10,
15(3)12,
15(4)15,
15(4)17,
17(3)12,
18(3)9
- might,
2(2)138,
10(4)5,
12(2)9
- moreover,
10(2)8,
11(3)14,
12(1)1,
14(1)5,
14(3)27,
16(3)12,
16(4)15,
17(3)9,
17(3)10,
18(3)11
- necessary,
2(2)177,
10(2)5,
11(3)16,
12(2)11,
12(3)16,
12(4)20,
14(1)13,
16(1)3
- operation,
1(1)93,
6(3)365,
9(4)421,
10(3)11,
11(4)20,
11(4)23,
12(2)10,
12(3)14,
12(3)18,
13(1)9,
13(1)10,
14(1)13,
14(4)31,
16(3)12,
16(4)14,
18(1)2
- organization,
1(1)66,
2(1)34,
2(1)65,
2(1)105,
2(2)159,
2(3)230,
2(3)269,
2(3)332,
9(2)113,
9(4)391,
10(4)2,
11(1)3,
12(3)15,
14(3)23,
14(3)25
- private,
2(2)177,
2(3)230,
6(4)472,
11(2)6,
12(1)6,
12(2)9,
12(3)16,
12(3)17,
12(3)18,
13(4)37,
14(3)26
- proposed,
1(1)93,
2(2)138,
2(3)269,
4(3)224,
9(2)162,
9(4)421,
10(1)2,
10(3)12,
10(4)4,
11(1)2,
11(1)3,
11(2)5,
11(3)14,
11(4)22,
11(4)23,
12(1)2,
12(1)3,
12(3)18,
12(4)21,
13(3)20,
13(3)27,
13(3)28,
13(4)36,
13(4)38,
13(4)39,
14(3)24,
14(3)27,
15(1)5,
15(3)11,
15(3)13,
15(4)15,
15(4)17,
16(3)10,
16(3)11,
16(4)14,
16(4)16,
17(1)3,
17(4)14,
18(3)11
- recently,
9(2)181,
13(3)26,
13(3)28,
13(4)37,
14(3)27,
15(1)2,
15(2)7,
16(3)10,
16(4)14,
16(4)17,
17(4)14,
17(4)16,
18(1)1
- remain,
11(2)2,
11(2)3,
13(4)41,
16(1)4
- sophisticated,
16(4)17,
17(3)12,
18(4)14
- standard,
2(3)230,
4(3)224,
7(2)319,
10(2)8,
10(3)11,
10(3)12,
11(1)4,
11(2)4,
12(1)1,
12(3)18,
13(3)28,
13(4)35,
13(4)37,
13(4)41,
15(1)2,
16(1)2,
16(1)3,
16(3)10,
16(4)15,
17(3)11,
17(4)16,
18(4)14
- strength,
2(3)269,
10(2)5,
10(4)6,
11(1)2,
11(4)22,
17(2)7,
18(1)1,
18(4)13
- study,
2(3)230,
7(2)206,
10(2)5,
10(4)5,
11(1)3,
11(2)3,
11(4)23,
12(1)6,
12(3)14,
12(4)20,
13(4)40,
14(1)7,
14(2)18,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(2)10,
15(3)13,
17(1)1,
17(2)7,
17(3)12,
17(4)14,
18(1)1,
18(1)2,
18(1)4,
18(2)5,
18(2)7,
18(3)9,
18(4)13
- succeed,
15(3)12,
18(1)2
- take,
10(4)1,
12(3)17,
12(3)19,
12(4)22,
13(3)20,
16(2)5,
16(3)9,
16(3)10,
16(4)15,
17(3)10,
18(1)4,
18(2)5,
18(4)12
- target,
11(4)23,
13(3)20,
13(3)28,
13(4)35,
15(2)10,
15(4)17,
16(4)14,
17(4)13,
17(4)16
- technique,
1(1)3,
2(2)138,
2(3)230,
2(3)295,
7(2)274,
9(4)391,
9(4)461,
10(2)6,
10(3)9,
10(4)6,
11(2)2,
11(3)12,
11(3)16,
11(4)17,
11(4)18,
11(4)22,
12(1)4,
12(2)11,
12(2)13,
12(3)16,
12(3)18,
13(3)22,
13(3)25,
13(3)28,
13(4)32,
13(4)33,
13(4)35,
13(4)36,
13(4)39,
14(1)3,
14(1)5,
14(1)6,
14(1)13,
14(3)24,
14(4)32,
15(1)2,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(4)17,
15(4)18,
16(1)2,
16(2)6,
16(2)7,
16(3)11,
16(4)13,
16(4)14,
17(3)9,
17(3)12,
17(4)16,
18(1)2,
18(2)6,
18(3)11
- time,
2(1)105,
2(3)332,
2(4)390,
9(4)461,
10(1)3,
10(2)8,
11(2)3,
11(2)4,
11(2)5,
11(3)13,
11(4)17,
11(4)20,
11(4)21,
11(4)23,
12(2)8,
12(3)17,
12(3)18,
12(3)19,
12(4)20,
12(4)21,
12(4)22,
13(4)37,
13(4)39,
14(1)2,
14(1)11,
14(1)14,
14(3)26,
14(4)31,
15(2)7,
15(3)12,
15(4)17,
16(1)4,
16(4)13,
16(4)14,
16(4)17,
17(3)9,
17(3)10,
17(3)11,
17(4)13,
18(1)2,
18(1)4,
18(3)10
- timing,
12(2)13,
12(3)17,
12(4)22,
16(1)3,
17(2)8
- two,
1(1)26,
9(4)391,
10(1)4,
10(2)6,
10(2)8,
10(3)10,
10(4)4,
11(2)1,
11(2)4,
11(2)6,
11(3)13,
11(4)22,
12(1)2,
12(1)3,
12(1)4,
12(1)6,
12(3)14,
12(4)20,
13(3)22,
13(3)27,
13(4)40,
14(1)4,
14(1)5,
14(4)30,
15(1)2,
15(1)5,
15(2)6,
15(3)11,
15(3)12,
16(1)1,
16(1)2,
16(1)4,
16(3)9,
16(3)10,
16(4)15,
17(4)13,
18(2)5,
18(4)12,
18(4)13,
18(4)14
- used,
1(1)3,
2(1)65,
7(2)319,
9(2)181,
10(1)2,
10(2)5,
10(2)7,
10(2)8,
10(4)2,
11(1)2,
11(1)3,
11(2)3,
11(3)14,
11(3)15,
11(3)16,
11(4)21,
11(4)22,
12(2)8,
12(3)15,
13(1)10,
13(3)22,
13(3)25,
13(4)29,
13(4)34,
14(1)3,
14(1)12,
14(1)13,
14(3)27,
15(1)3,
15(1)5,
15(3)12,
15(4)17,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
17(1)1,
17(2)7,
17(3)9,
17(4)13,
18(1)3,
18(2)5,
18(2)6,
18(3)9,
18(4)13,
18(4)14
- vulnerability,
7(2)319,
12(2)11,
13(4)38,
14(1)7,
14(1)13,
17(1)1,
17(3)11
- way,
2(1)3,
2(1)65,
2(3)230,
2(3)269,
9(4)461,
10(4)3,
10(4)4,
11(1)2,
11(3)13,
12(1)5,
12(2)8,
12(2)11,
12(3)14,
13(1)10,
13(3)22,
13(3)28,
13(4)34,
15(2)10,
15(4)15,
16(3)10,
16(3)11,
16(4)17,
17(2)6
- weight,
16(1)2
- work,
2(2)138,
2(3)269,
10(3)10,
10(4)6,
11(2)2,
11(2)3,
11(3)15,
11(4)17,
11(4)19,
12(2)10,
12(2)11,
12(2)12,
12(3)16,
12(3)17,
12(3)18,
13(3)25,
13(4)38,
14(1)2,
14(1)14,
15(2)7,
15(2)10,
15(3)12,
15(4)15,
15(4)17,
16(1)3,
16(1)4,
16(2)8,
16(3)10,
16(3)11,
16(4)13,
16(4)15,
17(3)12,
18(2)6,
18(4)13
- yield,
11(4)17,
17(1)1,
18(1)4