User menu

Moments-Correlating DPA

Bibliographic reference Moradi, Amir ; Standaert, François-Xavier. Moments-Correlating DPA.Theory of Implementations (TI 2016) (Vienna (Austria), 24/10/2016).
Permanent URL http://hdl.handle.net/2078.1/181917
  1. Adrian Thillard, Emmanuel Prouff, and Thomas Roche. Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack. In Guido Bertoni and Jean-Sébastien Coron, editors, CHES, volume 8086 of Lecture Notes in Computer Science, pages 21--36. Springer, 2013.
  2. François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, and Stefan Mangard. The World Is Not Enough: Another Look on Second-Order DPA. In Masayuki Abe, editor, ASIACRYPT, volume 6477 of Lecture Notes in Computer Science, pages 112--129. Springer, 2010.
  3. Standaert François-Xavier, Malkin Tal G., Yung Moti, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Advances in Cryptology - EUROCRYPT 2009 (2009) ISBN:9783642010002 p.443-461, 10.1007/978-3-642-01001-9_26
  4. Standaert O.-X., Peeters E., Rouvroy G., Quisquater J.-J., An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays, 10.1109/jproc.2005.862437
  5. Schramm Kai, Wollinger Thomas, Paar Christof, A New Class of Collision Attacks and Its Application to DES, Fast Software Encryption (2003) ISBN:9783540204497 p.206-222, 10.1007/978-3-540-39887-5_16
  6. Schneider Tobias, Moradi Amir, Leakage assessment methodology : Extended version, 10.1007/s13389-016-0120-y
  7. Renauld Mathieu, Standaert François-Xavier, Veyrat-Charvillon Nicolas, Kamel Dina, Flandre Denis, A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices, Advances in Cryptology – EUROCRYPT 2011 (2011) ISBN:9783642204647 p.109-128, 10.1007/978-3-642-20465-4_8
  8. Emmanuel Prouff and Patrick Schaumont, editors. Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9--12, 2012. Proceedings, volume 7428 of Lecture Notes in Computer Science. Springer, 2012.
  9. Prouff E., Rivain M., Bevan R., Statistical Analysis of Second Order Differential Power Analysis, 10.1109/tc.2009.15
  10. Merino Del Pozo Santos, Standaert François-Xavier, Blind Source Separation from Single Measurements Using Singular Spectrum Analysis, Lecture Notes in Computer Science (2015) ISBN:9783662483237 p.42-59, 10.1007/978-3-662-48324-4_3
  11. Axel Poschmann, Amir Moradi, Khoongming Khoo, Chu-Wee Lim, Huaxiong Wang, and San Ling. Side-Channel Resistant Crypto for Less than 2,300 GE. J. Cryptology, 24(2):322--345, 2011.
  12. Kenneth G. Paterson, editor. Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15--19, 2011. Proceedings, volume 6632 of Lecture Notes in Computer Science. Springer, 2011.
  13. Nikova Svetla, Rijmen Vincent, Schläffer Martin, Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches, 10.1007/s00145-010-9085-7
  14. Morita Tech. Side-channel Attack Standard Evaluation Board (SASEBO). http://www.morita-tech.co.jp/SAKURA/en/index.html.
  15. Amir Moradi and Alexander Wild. Assessment of hiding the higher-order leakages in hardware - what are the achievements versus overheads? In Güneysu and Handschuh citeDBLP:conf/ches/2015, pages 453--474.
  16. Moradi Amir, Poschmann Axel, Ling San, Paar Christof, Wang Huaxiong, Pushing the Limits: A Very Compact and a Threshold Implementation of AES, Advances in Cryptology – EUROCRYPT 2011 (2011) ISBN:9783642204647 p.69-88, 10.1007/978-3-642-20465-4_6
  17. Moradi A., Mischke O., Paar C., One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores, 10.1109/tc.2012.154
  18. Moradi Amir, Mischke Oliver, Paar Christof, Practical evaluation of DPA countermeasures on reconfigurable hardware, 10.1109/hst.2011.5955014
  19. Moradi Amir, Mischke Oliver, Eisenbarth Thomas, Correlation-Enhanced Power Analysis Collision Attack, Cryptographic Hardware and Embedded Systems, CHES 2010 (2010) ISBN:9783642150302 p.125-139, 10.1007/978-3-642-15031-9_9
  20. Amir Moradi and Oliver Mischke. How Far Should Theory Be from Practice? - Evaluation of a Countermeasure. In Prouff and SchaumontciteDBLP:conf/ches/2012, pages 92--106.
  21. Moradi Amir, Immler Vincent, Early Propagation and Imbalanced Routing, How to Diminish in FPGAs, Lecture Notes in Computer Science (2014) ISBN:9783662447086 p.598-615, 10.1007/978-3-662-44709-3_33
  22. Moradi Amir, Statistical Tools Flavor Side-Channel Collision Attacks, Advances in Cryptology – EUROCRYPT 2012 (2012) ISBN:9783642290107 p.428-445, 10.1007/978-3-642-29011-4_26
  23. Mather Luke, Oswald Elisabeth, Bandenburg Joe, Wójcik Marcin, Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests, Advances in Cryptology - ASIACRYPT 2013 (2013) ISBN:9783642420320 p.486-505, 10.1007/978-3-642-42033-7_25
  24. Mangard Stefan, Popp Thomas, Gammel Berndt M., Side-Channel Leakage of Masked CMOS Gates, Lecture Notes in Computer Science (2005) ISBN:9783540243991 p.351-365, 10.1007/978-3-540-30574-3_24
  25. Mangard S., Oswald E., Standaert F.-X., One for all – all for one: unifying standard differential power analysis attacks, 10.1049/iet-ifs.2010.0096
  26. Mangard Stefan, Hardware Countermeasures against DPA – A Statistical Analysis of Their Effectiveness, Topics in Cryptology – CT-RSA 2004 (2004) ISBN:9783540209966 p.222-235, 10.1007/978-3-540-24660-2_18
  27. Tim Güneysu and Helena Handschuh, editors. Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13--16, 2015, Proceedings, volume 9293 of Lecture Notes in Computer Science. Springer, 2015.
  28. Vincent Grosso, François-Xavier Standaert, and Emmanuel Prouff. Low entropy masking schemes, revisited. In Aurélien Francillon and Pankaj Rohatgi, editors, Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27--29, 2013. Revised Selected Papers, volume 8419 of Lecture Notes in Computer Science, pages 33--43. Springer, 2013.
  29. Gornik Andreas, Moradi Amir, Oehm Jurgen, Paar Christof, A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design, Implementation, and Evaluation, 10.1109/tcad.2015.2423274
  30. Gérard Benoît, Standaert François-Xavier, Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting, Cryptographic Hardware and Embedded Systems – CHES 2012 (2012) ISBN:9783642330261 p.175-192, 10.1007/978-3-642-33027-8_11
  31. Fei Yunsi, Luo Qiasi, Ding A. Adam, A Statistical Model for DPA with Novel Algorithmic Confusion Analysis, Cryptographic Hardware and Embedded Systems – CHES 2012 (2012) ISBN:9783642330261 p.233-250, 10.1007/978-3-642-33027-8_14
  32. Durvaux François, Standaert François-Xavier, Veyrat-Charvillon Nicolas, Mairy Jean-Baptiste, Deville Yves, Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits, Constructive Side-Channel Analysis and Secure Design (2015) ISBN:9783319214757 p.34-50, 10.1007/978-3-319-21476-4_3
  33. Durvaux François, Standaert François-Xavier, From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces, Advances in Cryptology – EUROCRYPT 2016 (2016) ISBN:9783662498897 p.240-262, 10.1007/978-3-662-49890-3_10
  34. François Durvaux and François-Xavier Standaert. Towards easy leakage certification. IACR Cryptology ePrint Archive, 2015:537, 2015.
  35. Durvaux François, Standaert François-Xavier, Veyrat-Charvillon Nicolas, How to Certify the Leakage of a Chip?, Advances in Cryptology – EUROCRYPT 2014 (2014) ISBN:9783642552199 p.459-476, 10.1007/978-3-642-55220-5_26
  36. Alexandre Duc, Sebastian Faust, and François-Xavier Standaert. Making masking security proofs concrete - or how to evaluate the security of any leaking device. In Elisabeth Oswald and Marc Fischlin, editors, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26--30, 2015, Proceedings, Part I, volume 9056 of Lecture Notes in Computer Science, pages 401--429. Springer, 2015.
  37. Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi. Template Attacks. In Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, CHES, volume 2523 of Lecture Notes in Computer Science, pages 13--28. Springer, 2002.
  38. Chari Suresh, Jutla Charanjit S., Rao Josyula R., Rohatgi Pankaj, Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.398-412, 10.1007/3-540-48405-1_26
  39. Brier Eric, Clavier Christophe, Olivier Francis, Correlation Power Analysis with a Leakage Model, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.16-29, 10.1007/978-3-540-28632-5_2
  40. Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, and C. Vikkelsoe. PRESENT: An Ultra-Lightweight Block Cipher. In Pascal Paillier and Ingrid Verbauwhede, editors, CHES, volume 4727 of Lecture Notes in Computer Science, pages 450--466. Springer, 2007.
  41. Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, and Vincent Rijmen. A More Efficient AES Threshold Implementation. IACR Cryptology ePrint Archive, 2013:697, 2013.