User menu

Accès à distance ? S'identifier sur le proxy UCLouvain

Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations

  • Open access
  • PDF
  • 1.01 M
  1. Akkar Mehdi-Laurent, Giraud Christophe, An Implementation of DES and AES, Secure against Some Attacks, Cryptographic Hardware and Embedded Systems — CHES 2001 (2001) ISBN:9783540425212 p.309-318, 10.1007/3-540-44709-1_26
  2. Batina Lejla, Gierlichs Benedikt, Prouff Emmanuel, Rivain Matthieu, Standaert François-Xavier, Veyrat-Charvillon Nicolas, Mutual Information Analysis: a Comprehensive Study, 10.1007/s00145-010-9084-8
  3. Blömer Johannes, Guajardo Jorge, Krummel Volker, Provably Secure Masking of AES, Selected Areas in Cryptography (2004) ISBN:9783540243274 p.69-83, 10.1007/978-3-540-30564-4_5
  4. Bruneau Nicolas, Danger Jean-Luc, Guilley Sylvain, Heuser Annelie, Teglia Yannick, Boosting Higher-Order Correlation Attacks by Dimensionality Reduction, Security, Privacy, and Applied Cryptography Engineering (2014) ISBN:9783319120591 p.183-200, 10.1007/978-3-319-12060-7_13
  5. Bruneau, N., Guilley, S., Heuser, A., Marion, D., Rioul, O.: Less is more dimensionality reduction from a theoretical perspective. In: Handschuh and Güneysu [13]
  6. Bruneau Nicolas, Guilley Sylvain, Heuser Annelie, Rioul Olivier, Masks Will Fall Off, Lecture Notes in Computer Science (2014) ISBN:9783662456071 p.344-365, 10.1007/978-3-662-45608-8_19
  7. Bruneau, N., Guilley, S., Najm, Z., Teglia, Y.: Multivariate high-order attacks of shuffled tables recomputation. In: Handschuh and Güneysu [13]
  8. Chari Suresh, Jutla Charanjit S., Rao Josyula R., Rohatgi Pankaj, Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.398-412, 10.1007/3-540-48405-1_26
  9. Clavier Christophe, Coron Jean-Sébastien, Dabbous Nora, Differential Power Analysis in the Presence of Hardware Countermeasures, Cryptographic Hardware and Embedded Systems — CHES 2000 (2000) ISBN:9783540414551 p.252-263, 10.1007/3-540-44499-8_20
  10. Coron Jean-Sébastien, Higher Order Masking of Look-Up Tables, Advances in Cryptology – EUROCRYPT 2014 (2014) ISBN:9783642552199 p.441-458, 10.1007/978-3-642-55220-5_25
  11. Ding A. Adam, Zhang Liwei, Fei Yunsi, Luo Pei, A Statistical Model for Higher Order DPA on Masked Devices, Lecture Notes in Computer Science (2014) ISBN:9783662447086 p.147-169, 10.1007/978-3-662-44709-3_9
  12. Duc Alexandre, Faust Sebastian, Standaert François-Xavier, Making Masking Security Proofs Concrete, Advances in Cryptology -- EUROCRYPT 2015 (2015) ISBN:9783662467992 p.401-429, 10.1007/978-3-662-46800-5_16
  13. Güneysu, T., Handschuh, H. (eds.): CHES 2015. LNCS, vol. 9293. Springer, Heidelberg (2015)
  14. Herbst Christoph, Oswald Elisabeth, Mangard Stefan, An AES Smart Card Implementation Resistant to Power Analysis Attacks, Applied Cryptography and Network Security (2006) ISBN:9783540347033 p.239-252, 10.1007/11767480_16
  15. Ishai Yuval, Sahai Amit, Wagner David, Private Circuits: Securing Hardware against Probing Attacks, Advances in Cryptology - CRYPTO 2003 (2003) ISBN:9783540406747 p.463-481, 10.1007/978-3-540-45146-4_27
  16. Lemke-Rust Kerstin, Paar Christof, Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods, Computer Security – ESORICS 2007 ISBN:9783540748342 p.454-468, 10.1007/978-3-540-74835-9_30
  17. Lemke-Rust Kerstin, Paar Christof, Gaussian Mixture Models for Higher-Order Side Channel Analysis, Cryptographic Hardware and Embedded Systems - CHES 2007 ISBN:9783540747345 p.14-27, 10.1007/978-3-540-74735-2_2
  18. Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)
  19. Messerges Thomas S., Securing the AES Finalists Against Power Analysis Attacks, Fast Software Encryption (2001) ISBN:9783540417286 p.150-164, 10.1007/3-540-44706-7_11
  20. Messerges Thomas S., Using Second-Order Power Analysis to Attack DPA Resistant Software, Cryptographic Hardware and Embedded Systems — CHES 2000 (2000) ISBN:9783540414551 p.238-251, 10.1007/3-540-44499-8_19
  21. Moradi Amir, Statistical Tools Flavor Side-Channel Collision Attacks, Advances in Cryptology – EUROCRYPT 2012 (2012) ISBN:9783642290107 p.428-445, 10.1007/978-3-642-29011-4_26
  22. Moradi, A., Standaert, F.X.: Moments-correlating DPA. IACR Cryptology ePrint Archive 2014, p. 409, 2 June 2014
  23. Moradi Amir, Wild Alexander, Assessment of Hiding the Higher-Order Leakages in Hardware, Lecture Notes in Computer Science (2015) ISBN:9783662483237 p.453-474, 10.1007/978-3-662-48324-4_23
  24. Nikova Svetla, Rijmen Vincent, Schläffer Martin, Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches, 10.1007/s00145-010-9085-7
  25. Oswald Elisabeth, Mangard Stefan, Template Attacks on Masking—Resistance Is Futile, Lecture Notes in Computer Science (2006) ISBN:9783540693277 p.243-256, 10.1007/11967668_16
  26. Pan J., den Hartog J. I., Lu Jiqiang, You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation, Information Security Applications (2009) ISBN:9783642108372 p.178-192, 10.1007/978-3-642-10838-9_14
  27. Peeters Eric, Standaert François-Xavier, Donckers Nicolas, Quisquater Jean-Jacques, Improved Higher-Order Side-Channel Attacks with FPGA Experiments, Cryptographic Hardware and Embedded Systems – CHES 2005 (2005) ISBN:9783540284741 p.309-323, 10.1007/11545262_23
  28. Prouff Emmanuel, Rivain Matthieu, A Generic Method for Secure SBox Implementation, Information Security Applications (2007) ISBN:9783540775348 p.227-244, 10.1007/978-3-540-77535-5_17
  29. Prouff E., Rivain M., Bevan R., Statistical Analysis of Second Order Differential Power Analysis, 10.1109/tc.2009.15
  30. Rivain Matthieu, Prouff Emmanuel, Provably Secure Higher-Order Masking of AES, Cryptographic Hardware and Embedded Systems, CHES 2010 (2010) ISBN:9783642150302 p.413-427, 10.1007/978-3-642-15031-9_28
  31. Rivain Matthieu, Prouff Emmanuel, Doget Julien, Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers, Lecture Notes in Computer Science (2009) ISBN:9783642041372 p.171-188, 10.1007/978-3-642-04138-9_13
  32. Standaert François-Xavier, Malkin Tal G., Yung Moti, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Advances in Cryptology - EUROCRYPT 2009 (2009) ISBN:9783642010002 p.443-461, 10.1007/978-3-642-01001-9_26
  33. Standaert François-Xavier, Veyrat-Charvillon Nicolas, Oswald Elisabeth, Gierlichs Benedikt, Medwed Marcel, Kasper Markus, Mangard Stefan, The World Is Not Enough: Another Look on Second-Order DPA, Advances in Cryptology - ASIACRYPT 2010 (2010) ISBN:9783642173721 p.112-129, 10.1007/978-3-642-17373-8_7
  34. Stuart, A., Ord, K.: Kendall’s Advanced Theory of Statistics: Distribution Theory, 6th edn. Wiley-Blackwell, New York (1994). ISBN-10: 0470665300; ISBN-13: 978-0470665305
  35. TELECOM ParisTech SEN research group. DPA Contest, 4th edn., 2013–2014. http://www.DPAcontest.org/v4/
  36. Tunstall Michael, Whitnall Carolyn, Oswald Elisabeth, Masking Tables—An Underestimated Security Risk, Fast Software Encryption (2014) ISBN:9783662439326 p.425-444, 10.1007/978-3-662-43933-3_22
  37. Veyrat-Charvillon Nicolas, Medwed Marcel, Kerckhof Stéphanie, Standaert François-Xavier, Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note, Advances in Cryptology – ASIACRYPT 2012 (2012) ISBN:9783642349607 p.740-757, 10.1007/978-3-642-34961-4_44
  38. Waddle Jason, Wagner David, Towards Efficient Second-Order Power Analysis, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.1-15, 10.1007/978-3-540-28632-5_1
  39. Weisstein, E.W.: Cumulant. From MathWorld A Wolfram Web Resource. http://mathworld.wolfram.com/Cumulant.html
Bibliographic reference Bruneau, Nicolas ; Guilley, Sylvain ; Heuser, Annelie ; Rioul, Olivier ; Standaert, François-Xavier ; et. al. Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016) (Hanoi (Vietnam), du 04/12/2016 au 08/12/2016). In: Junhg Hee Cheon, Tsuyoshi Takagi, Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016), Springer2016, p. 573-601
Permanent URL http://hdl.handle.net/2078.1/181828