과제정보
연구 과제 주관 기관 : IITP (Institute for Information & communications Technology Promotion, National Research Foundation of Korea
참고문헌
- K. Gandolfi, C. Mourtel, and F. Olivier, "Electromagnetic analysis: Concrete results," in Proc. CHES, May 2001, pp. 251-261.
- P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," in Proc. CRYPTO, Aug. 1996, pp. 104-113.
- P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Proc. CRYPTO, Aug. 1999, pp. 388-397.
- R. Novak, "SPA-based adaptive chosen-ciphertext attack on RSA implementation," in Proc. PKC, Feb. 2002, pp. 252-262.
- J.-J. Quisquater and D. Samyde, "Electromagnetic analysis (EMA): Measures and counter-measures for smart cards," in Proc. Smart Card Programming and Security, 2001, pp. 200-210.
- S. Chow, P. Eisen, H. Johnson, and P. C. V. Oorschot, "White-box cryptography and an AES implementation," in Proc. SAC, Aug. 2002, pp. 250-270.
- S. Chow, P. Eisen, H. Johnson, and P. C. van Oorschot, "A white-box DES Implementation for DRM Applications," in Proc. DRM, Nov. 2003, pp. 1-15.
- B. Wyseur, W. Michiels, P. Gorissen, and B. Preneel, "Cryptanalysis of white-box DES implementations with arbitrary external encodings," in Proc. SAC, Aug. 2007, pp. 264-277.
- T. Lepoint, M. Rivain, Y. D. Mulder, P. Roelse, and B. Preneel, "Two attacks on a white-box AES Implementation," in Proc. SAC, Aug. 2013, pp. 265-285.
- Y. Xiao and X. Lai, "A secure implementation of white-box AES," in Proc. IEEE CSA, Dec. 2009, pp. 1-6.
- M. Karroumi, "Protecting white-box AES with dual ciphers," in Proc. ICISC, Dec. 2010, pp. 278-291.
- Y. D. Mulder, P. Roelse, and B. Preneel, "Cryptanalysis of the Xiao-Lai white-box AES implementation," in Proc. SAC, Aug. 2012, pp. 34-49.
- C. Delerablee, T. Lepoint, P. Paillier, and M. Rivain, "White-box security notions for symmetric encryption schemes," in Proc. SAC, Aug. 2013, pp. 247-264.
- A. Saxena, B. Wyseur, and B. Preneel, "Towards security notions for white-box cryptography," in Proc. Inf. Security, Sept. 2009, pp. 49-58.
- B. Wyseur, "White-box cruptography," Ph.D. thesis, Katholieke Universiteit Leuven, 2009.
- A. Biryukov, C. Bouillaguet, and D. Khovratovich, "Cryptographic schemes based on the ASASA structure: Black-box, white-box, and public-key," in Proc. ASIACRYPT, Dec. 2014, pp. 63-84.
- A. Biryukov and A. Shamir, "Structural Cryptanalysis of SASAS," in Proc. EUROCRYPT,May 2001, pp. 395-405.
- O. Billet, H. Gilbert, and C. Ech-Chatbi, "Cryptanalysis of a white box AES implementation," in Proc. SAC, Aug. 2004, pp. 227-240.
- A. Biryukov, C. D. Canniere, A. Braeken, and B. Preneel, "A toolbox for cryptanalysis: Linear and affine equivalence algorithms," in Proc. EUROCRYPT, May 2003, pp. 33-50.
- W. Michiels, P. Gorissen, and H. D. L. Hollmann, "Cryptanalysis of a generic class of white-box implementations," in Proc. SAC, Aug. 2008, pp. 414-428.
- I. Dinur, O. Dunkelman, N. Keller, and A. Shamir, "Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems," in Proc. CRYPTO, Aug. 2012, pp. 719-740.
- J.-S. Coron, D. Naccache, and M. Tibouchi, "Public key compression and modulus switching for fully homomorphic encryption over the integers," in Proc. EUROCRYPT, Apr. 2012, pp. 446-464.
- C. Gentry and S. Halevi, "Implementing gentry's fully-homomorphic encryption scheme," in Proc. EUROCRYPT, May 2011, pp. 129-148.
- N. Smart and F. Vercauteren, "Fully homomorphic SIMD operations," Designs, Codes and Cryptography, vol. 71, no. 1, pp. 57-81, 2014. https://doi.org/10.1007/s10623-012-9720-4
- R. Schroeppel and A. Shamir, "A TcS2 = 0 (2n) time/space tradeoff for certain NP-complete problems," in Proc. IEEE Foundations of Computer Science, Oct. 1979, pp. 328-336.