User menu

Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards

Bibliographic reference Liu, Junrong ; Yu, Yu ; Standaert, François-Xavier ; Guo, Zheng ; Gu, Dawu ; et. al. Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards.20th European Symposium on Research in Computer Security (ESORICS 2015) (Vienna (Austria), du 21/09/2015 au 25/09/2015). In: Günther Pernul, Peter Y.A.Ryan, Edgar R.Weippl, Proceedings of ESORICS 2015, Springer : Trier (Germany)2015, p. 468-480
Permanent URL
  1. 3GPP specification: 35.206 (Specification of the MILENAGE algorithm set).
  2. Cryptography for mobile network - C implementation and Python bindings.
  3. List of LTE networks.
  4. List of UMTS networks.
  5. Security Technology for SAE/LTE. . Accessed 6 January 2015
  6. Barkan Elad, Biham Eli, Keller Nathan, Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication, Advances in Cryptology - CRYPTO 2003 (2003) ISBN:9783540406747 p.600-616, 10.1007/978-3-540-45146-4_35
  7. Biham Eli, Dunkelman Orr, Cryptanalysis of the A5/1 GSM Stream Cipher, Lecture Notes in Computer Science (2000) ISBN:9783540414520 p.43-51, 10.1007/3-540-44495-5_5
  8. Biryukov Alex, Shamir Adi, Wagner David, Real Time Cryptanalysis of A5/1 on a PC, Fast Software Encryption (2001) ISBN:9783540417286 p.1-18, 10.1007/3-540-44706-7_1
  9. Bogdanov Andrey, Eisenbarth Thomas, Rupp Andy, A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations, Cryptographic Hardware and Embedded Systems - CHES 2007 ISBN:9783540747345 p.394-412, 10.1007/978-3-540-74735-2_27
  10. Briceno, M., Goldberg, I., Wagner, D.: GSM Cloning (1998). . Accessed 6 January 2015
  11. Brier Eric, Clavier Christophe, Olivier Francis, Correlation Power Analysis with a Leakage Model, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.16-29, 10.1007/978-3-540-28632-5_2
  12. Daemen Joan, Rijmen Vincent, The Design of Rijndael, ISBN:9783642076466, 10.1007/978-3-662-04722-4
  13. Gindraux, S.: From 2G to 3G: a guide to mobile security. In: 3rd International Conference on 3G Mobile Communication Technologies, pp. 308–311 (2002)
  14. Mangard S., Oswald E., Standaert F.-X., One for all – all for one: unifying standard differential power analysis attacks, 10.1049/iet-ifs.2010.0096
  15. Maximov Alexander, Johansson Thomas, Babbage Steve, An Improved Correlation Attack on A5/1, Selected Areas in Cryptography (2004) ISBN:9783540243274 p.1-18, 10.1007/978-3-540-30564-4_1
  16. Niemi, V., Nyberg, K.: UMTS Security. Wiley Online Library (2003)
  17. Prouff Emmanuel, DPA Attacks and S-Boxes, Fast Software Encryption (2005) ISBN:9783540265412 p.424-441, 10.1007/11502760_29
  18. Rao J.R., Rohatgi P., Scherzer H., Tinguely S., Partitioning attacks: or how to rapidly clone some GSM cards, 10.1109/secpri.2002.1004360
  19. Veyrat-Charvillon Nicolas, Gérard Benoît, Renauld Mathieu, Standaert François-Xavier, An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks, Selected Areas in Cryptography (2013) ISBN:9783642359989 p.390-406, 10.1007/978-3-642-35999-6_25
  20. Zhou Yuanyuan, Yu Yu, Standaert François-Xavier, Quisquater Jean-Jacques, On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards, Financial Cryptography and Data Security (2013) ISBN:9783642398834 p.230-238, 10.1007/978-3-642-39884-1_20