References
- Moon Si-hoon, Kim Min-woo, and Kwon Tae-kyung, "Trends in Lightweight Crypto Technology for IoT Communication Environments," The Journal of The Korean Institute of Communication Sciences, Vol.33, No.3, pp.80-86, 2016.
- Hwajeong Seo and Howon Kim, "Implementation of Lightweight Encryption Algorithms for the Internet of Things," REVIEW OF KIISC, Vol.25, No.2, pp.12-19, 2015
- P. C. Kocher, "Timing Attacks on Implementation of Diffe-Hellman, RSA, DSS and Other Systems," Proc. Adv. Cryptology, pp.104-113, 1996.
- E. Biham and A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems," Proceedings of Crypto 1997, LNCS 1294, pp.513-525, Aug. 1997.
- J. Quisquater and D. Samyde, "Electromagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards," Proc. e-Smart, pp.200-210, 2001,
- National Institute of Standards and Technology, "Advanced Encryption Standards," NIST FIPS PUB 197, 2001.
- R. Rivest, A. Shamir, and L, Adelman, "A method for obtaining digital signature and public-key cryptosystems," Comm. of the ACM 21, pp.120-126, 1978. https://doi.org/10.1145/359340.359342
- D. Hong, J. Lee, D. Kim, D. Kwon, K. Ryu, and D. Lee, "LEA, A 128-bit block cipher for fast encryption on common processors," WISA'13, LNCS 8267, pp.3-27, 2014.
- TTA, "128-bit lightweight block cipher LEA," TTAK.KO-12.0223, Dec, 2013.
- D. Kwon, J. Kim, S. Park, S. Sung, Y. Sohn, J. Song, Y. Yeom, E. Yoon, S. Lee, J.Lee, S. Chee, D. Han, and J. Hong, New Block Cipher : ARIA In ICISC'03, LNCS 2971, pp. 432-445, Springer-Verlag, 2003.
- Y. Kim and H. Yoon, "First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA," IACR Cryptology ePrint Archive, 2014:999, Available at https://eprint.iacr.org/2014/999.pdf
- J. Park, T. Kim, H. An, Y. Won, and D. Han, "Side channel attacks on LEA and its countermeasures," Journal of The Korea Institute of Information Security & Cryptology (JKIISC), Vol.25, No.2, pp.449-456, 2015. https://doi.org/10.13089/JKIISC.2015.25.2.449
- JungKab Seo, ChangKyun Kim, JaeCheol Ha, SangJae Moon, and IlHwan Park, "Differential Power Analysis Attack of a Block Cipher ARIA," Journal of the Korea Institute of Information Security & Cryptology(Korea Institute Of Information Security And Cryptology), Vol.15, No.1, pp.99-107, 2005.
- HyungSo Yoo, JaeCheol-Ha, ChangKyun Kim, IlHwan Park, and SangJae Moon, "A Secure ARIA implementation resistant to Differential Power Attack using Random Masking Method," Journal of the Korea Institute of Information Security & Cryptology, Vol.16, No.2, pp.129-139, 2006.
- ChangKyun Kim, JaeHoon Park, Daewan Han, and Dong Hoon Lee, "Investigation of Masking Based Side Channel Countermeasures for LEA," Journal of the Korea Institute of Information Security & Cryptology, Vol.26, No.6, pp.1431-1441, 2016. https://doi.org/10.13089/JKIISC.2016.26.6.1431
- L. Goubin and J.Patarin, "DES and Differential Power Analysis - The Duplication Method," CHES 1999, LNCS 1717, pp.158-172, Springer, 1999
- Paul Kocher, Joshua Jaffe, and Benjamin Jun, "Differential Power Analysis," CRYPTO '99, Springer-Verlag, 1999, pp.388-397.
- Eric Brier, Christophe Clavier, and Francis Olivier, "Correlation Power Analysis with a Leakage Model," CHES 2004: Cryptographic Hardware and Embedded Systems - CHES 2004, pp.16-29.
- C. Herbst, E. Oswald, and S. Mangard, An AES Smart Card Implementation Resistant to Power Analysis Attacks. Lecture Notes in Computer Science, pp.239-252, 2006.