Information Security Applications
DOI: 10.1007/978-3-540-71093-6_13
|View full text |Cite
|
Sign up to set email alerts
|

Investigations of Power Analysis Attacks and Countermeasures for ARIA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…ARIA is known to be relatively strong against differential crypto-analysis and linear crypto-analysis [6]. Investigations of power analysis attacks and countermeasures for ARIA can be found in [7]- [9]. However, only a small number of papers have been published on the hardware architecture for the ARIA algorithm in contrast to AES.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…ARIA is known to be relatively strong against differential crypto-analysis and linear crypto-analysis [6]. Investigations of power analysis attacks and countermeasures for ARIA can be found in [7]- [9]. However, only a small number of papers have been published on the hardware architecture for the ARIA algorithm in contrast to AES.…”
Section: Related Workmentioning
confidence: 99%
“…Figure 1 shows how the S-box can be designed using GF(2 4 ) arithmetic, as described in (7). Figure 1(a) shows the S-box function, which is composed of the inversion over GF (2 8 ) and the affine transformation, here denoted by Affine(x).…”
Section: Detailed Hardware Architecture Of the Primitives 1 Submentioning
confidence: 99%