• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹Á¤º¸Åë½ÅÇÐȸ Çмú´ëȸ > 2014³â Ãß°èÇмú´ëȸ

2014³â Ãß°èÇмú´ëȸ

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) Àü·ÂºÐ¼®°ø°Ý¿¡ ´ëÇÑ ½ÇÇèȯ°æ ºÐ¼®
¿µ¹®Á¦¸ñ(English Title) Experimental Environment Analysis for Power Analysis Attacks
ÀúÀÚ(Author) °­¿µÁø   ÀÌÈÆÀç   Young Jin Kang   Hoon Jae Lee  
¿ø¹®¼ö·Ïó(Citation) VOL 18 NO. 02 PP. 0390 ~ 0393 (2014. 10)
Çѱ۳»¿ë
(Korean Abstract)
ÇöÀç Á¤º¸º¸È£¿¡ ´ëÇÑ Á߿伺ÀÌ ºÎ°¢µÇ°í ÀÖÀ¸¸ç u-Korea ¶Ç´Â À¯ºñÄõÅͽº IT ½Ã´ë¿¡¼­´Â Á¤º¸º¸È£°¡ ´õ¿í Áß¿ä½Ã µÇ°í ÀÖÀ¸¸ç, ƯÈ÷ ¼ÒÇü ¾ÏÈ£ ÀåÄ¡¿¡ À־ ÇÙ½ÉÀÌ µÇ´Â ¾ÏÈ£ ¾Ë°í¸®ÁòÀÇ º¸¾È¼ºÀÌ Áß¿äÇÑ ºÎºÐÀÌÁö¸¸ Àü·ÂºÐ¼®°ø°ÝÀº ¾ÏÈ£ ¾Ë°í¸®Áò ÀÚüÀÇ ¾ÈÀü¼ºÀÌ ³ô´Ù°í ÇÏ´õ¶óµµ ¾ÏÈ£ ¾Ë°í¸®ÁòÀÌ ±¸ÇöµÈ ¹æ¹ýÀ̳ª ±¸ÇöµÈ ȯ°æ¿¡ µû¶ó Àû¿ëÀÌ °¡´ÉÇÑ °ø°ÝÀÌ´Ù. ÀÌ¿¡ º» ³í¹®¿¡¼­´Â Àü·ÂºÐ¼®°ø°Ý¿¡ ´ëÇÏ¿© ¼³¸íÇÏ°í, ½ÇÇèȯ°æÀ» ºÐ¼® ÇÏ°íÀÚ ÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
The importance of this emerging information security and u-Korea or ubiquitous IT era, and the information security is more important. Especially, the small core device password encryption algorithm is an important part of the secure side channel attack cryptographic algorithms. However, it can provide high level of security, an adversary can attack small core device through implementation of cryptographic algorithms. In this paper describes for the Power Analysis attack and analyze the experimental environment.
Å°¿öµå(Keyword) Side Channel Attacks   PA Attack   Hamming weight  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå