User menu

Accès à distance ? S'identifier sur le proxy UCLouvain

Score-Based vs. Probability-Based Enumeration - A Cautionary Note

  • Open access
  • PDF
  • 1.04 M
  1. Bernstein, D.J., Lange, T., van Vredendaal, C.: Tighter, faster, simpler side-channel security evaluations beyond computing power. IACR Cryptology ePrint Archive, 2015:221 (2015)
  2. Bogdanov, A., Kizhvatov, I., Manzoor, K., Tischhauser, E., Witteman, M.: Fast and memory-efficient key recovery in side-channel attacks. IACR Cryptology ePrint Archive, 2015:795 (2015)
  3. Brier Eric, Clavier Christophe, Olivier Francis, Correlation Power Analysis with a Leakage Model, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.16-29, 10.1007/978-3-540-28632-5_2
  4. Chari Suresh, Rao Josyula R., Rohatgi Pankaj, Template Attacks, Cryptographic Hardware and Embedded Systems - CHES 2002 (2003) ISBN:9783540004097 p.13-28, 10.1007/3-540-36400-5_3
  5. Choudary Omar, Kuhn Markus G., Efficient Template Attacks, Smart Card Research and Advanced Applications (2014) ISBN:9783319083018 p.253-270, 10.1007/978-3-319-08302-5_17
  6. David, L., Wool, A.: A bounded-space near-optimal key enumeration algorithm for multi-dimensional side-channel attacks. IACR Cryptology ePrint Archive, 2015:1236 (2015)
  7. Doget Julien, Prouff Emmanuel, Rivain Matthieu, Standaert François-Xavier, Univariate side channel attacks and leakage modeling, 10.1007/s13389-011-0010-2
  8. Duc Alexandre, Faust Sebastian, Standaert François-Xavier, Making Masking Security Proofs Concrete, Advances in Cryptology -- EUROCRYPT 2015 (2015) ISBN:9783662467992 p.401-429, 10.1007/978-3-662-46800-5_16
  9. Durvaux François, Standaert François-Xavier, Veyrat-Charvillon Nicolas, How to Certify the Leakage of a Chip?, Advances in Cryptology – EUROCRYPT 2014 (2014) ISBN:9783642552199 p.459-476, 10.1007/978-3-642-55220-5_26
  10. Glowacz Cezary, Grosso Vincent, Poussier Romain, Schüth Joachim, Standaert François-Xavier, Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment, Fast Software Encryption (2015) ISBN:9783662481158 p.117-129, 10.1007/978-3-662-48116-5_6
  11. Kocher Paul, Jaffe Joshua, Jun Benjamin, Differential Power Analysis, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.388-397, 10.1007/3-540-48405-1_25
  12. Longo, J., Martin, D.P., Mather, L., Oswald, E., Sach, B., Stam, M.: How low can you go? using side-channel data to enhance brute-force key recovery. Cryptology ePrint Archive, Report 2016/609 (2016). http://eprint.iacr.org/
  13. Mangard Stefan, Hardware Countermeasures against DPA – A Statistical Analysis of Their Effectiveness, Topics in Cryptology – CT-RSA 2004 (2004) ISBN:9783540209966 p.222-235, 10.1007/978-3-540-24660-2_18
  14. Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)
  15. Mangard S., Oswald E., Standaert F.-X., One for all – all for one: unifying standard differential power analysis attacks, 10.1049/iet-ifs.2010.0096
  16. Martin, D.P., Mather, L., Oswald, E., Stam, M.: Characterisation and estimation of the key rank distribution in the context of side channel evaluations. IACR Cryptology ePrint Archive, 2016:491 (2016)
  17. Martin Daniel P., O’Connell Jonathan F., Oswald Elisabeth, Stam Martijn, Counting Keys in Parallel After a Side Channel Attack, Advances in Cryptology – ASIACRYPT 2015 (2015) ISBN:9783662487990 p.313-337, 10.1007/978-3-662-48800-3_13
  18. Poussier Romain, Grosso Vincent, Standaert François-Xavier, Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations, Smart Card Research and Advanced Applications (2016) ISBN:9783319312705 p.125-142, 10.1007/978-3-319-31271-2_8
  19. Poussier, R., Standaert, F.-X., Grosso, V.: Simple key enumeration (and rank estimation) using histograms: an integrated approach. IACR Cryptology ePrint Archive, 2016:571 (2016)
  20. Schindler Werner, Lemke Kerstin, Paar Christof, A Stochastic Model for Differential Side Channel Cryptanalysis, Cryptographic Hardware and Embedded Systems – CHES 2005 (2005) ISBN:9783540284741 p.30-46, 10.1007/11545262_3
  21. Veyrat-Charvillon Nicolas, Gérard Benoît, Renauld Mathieu, Standaert François-Xavier, An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks, Selected Areas in Cryptography (2013) ISBN:9783642359989 p.390-406, 10.1007/978-3-642-35999-6_25
  22. Veyrat-Charvillon Nicolas, Gérard Benoît, Standaert François-Xavier, Security Evaluations beyond Computing Power, Advances in Cryptology – EUROCRYPT 2013 (2013) ISBN:9783642383472 p.126-141, 10.1007/978-3-642-38348-9_8
  23. Ye Xin, Eisenbarth Thomas, Martin William, Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery, Smart Card Research and Advanced Applications (2015) ISBN:9783319167626 p.215-232, 10.1007/978-3-319-16763-3_13
Bibliographic reference Choudary, Marios O. ; Poussier, Romain ; Standaert, François-Xavier. Score-Based vs. Probability-Based Enumeration - A Cautionary Note.17th International Conference in Cryptology in India - Progress in cryptology (INDIACRYPT 2016) (Kolkata (India), du 11/12/2016 au 14/12/2016). In: Orr Dunkelman, Somitra Kumar Sanadhya, Proceedings of the 17th International Conference in Cryptology in India - Progress in cryptology (INDIACRYPT 2016), Springer2016, p. 137-152
Permanent URL http://hdl.handle.net/2078.1/181829