scispace - formally typeset
S

Sung-Ming Yen

Researcher at National Central University

Publications -  24
Citations -  566

Sung-Ming Yen is an academic researcher from National Central University. The author has contributed to research in topics: Cryptography & Side channel attack. The author has an hindex of 12, co-authored 24 publications receiving 551 citations.

Papers
More filters
Book ChapterDOI

Differential fault analysis on AES key schedule and some countermeasures

TL;DR: This paper describes a DFA attack on the AES key schedule that efficiently finds the key of AES-128 with feasible computation and less than thirty pairs of correct and faulty ciphertexts.
Book ChapterDOI

Power analysis by exploiting chosen message and internal collisions – vulnerability of checking mechanism for RSA-Decryption

TL;DR: A new side-channel vulnerability of cryptosystems implementation based on BRIP or square-multiply-always algorithm is pointed out by exploiting specially chosen input message of order two and further extension of the proposed attack is possible to develop more powerful attacks.
Book ChapterDOI

RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis

TL;DR: This article considers the problem of how to prevent the fast RSA signature and decryption computation with residue number system speedup from a hardware fault cryptanalysis in a highly reliable and efficient approach and proposes a new concept of fault infective CRT computation and fault infectives CRT recombination.
Book ChapterDOI

Relative doubling attack against montgomery ladder

TL;DR: In this research, immunity of the Montgomery ladder against the doubling attack is investigated and a remark is given to the problem of whether the upward (right-to-left) regular exponentiation algorithm is necessary against the original doubling attack and the proposed relative doubling attack.
Book ChapterDOI

Amplifying side-channel attacks with techniques from block cipher cryptanalysis

TL;DR: This work considers the integration of block cipher cryptanalysis techniques into a particular type of side-channel attack, the differential fault attack (DFA), and applies the DFA on the AES key schedule or on intermediate states within the AES and exploits distinguishers based on Square attacks and impossible differential cryptanalysis to cover the remaining rounds.