Advertisement

Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning No Results

  • Yoo-Jin BaekEmail author
  • Vanessa Gratzer
  • Sung-Hyun Kim
  • David Naccache
Chapter
Part of the Information Security and Cryptography book series (ISC)

Abstract

In addition to its usual complexity postulates, cryptography silently assumes that secrets can be physically protected in tamper-proof locations.

References

  1. 1.
    P. Kocher, J. Jaffe, B. Jun, in Differential Power Analysis, Advances in Cryptology - CRYPTO’99, Santa Barbara, CA, USA. Lecture Notes in Computer Science, vol. 1666 (Springer Verlag, Berlin, Heidelberg, 1999), pp. 388–397Google Scholar
  2. 2.
    R. Langley, Practical Statistics (Dover Publications, New York, NY, 1968)Google Scholar
  3. 3.
    I. Miller, J. Freund, R. Johnson, Probability and Statistics for Engineers (Prentice Hall, Englewood Cliffs, NJ, 1990)zbMATHGoogle Scholar
  4. 4.
    F. Wilcoxon, Individual comparisons by ranking methods. Biometrics 1, 80–83 (1945)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Yoo-Jin Baek
    • 1
    Email author
  • Vanessa Gratzer
    • 2
  • Sung-Hyun Kim
    • 1
  • David Naccache
    • 3
  1. 1.System LSI DivisionSamsung Electronics Co., Ltd.SuwonKorea
  2. 2.Centre de recherche en informatiqueUniversité Paris I,Panthéon-SorbonneParisFrance
  3. 3.Département d’informatiqueÉcole normale supérieureParisFrance

Personalised recommendations