User menu

Consolidating Inner Product Masking

Bibliographic reference Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Paglialonga, Clara ; Standaert, François-Xavier. Consolidating Inner Product Masking.23rd International Conference on the Theory and applications of Cryptology and Information Security (ASIACRYPT 2017) (Hong Kong (China), du 03/12/2017 au 07/12/2017). In: Tsuyoshi Takagi, Thomas peyrin, Proceedings of EUROCRYPT 2017, Springer2017, p. 724-754
Permanent URL
  1. Balasch Josep, Gierlichs Benedikt, Reparaz Oscar, Verbauwhede Ingrid, DPA, Bitslicing and Masking at 1 GHz, Lecture Notes in Computer Science (2015) ISBN:9783662483237 p.599-619, 10.1007/978-3-662-48324-4_30
  2. Batina Lejla, Chmielewski Łukasz, Papachristodoulou Louiza, Schwabe Peter, Tunstall Michael, Online Template Attacks, Progress in Cryptology -- INDOCRYPT 2014 (2014) ISBN:9783319130385 p.21-36, 10.1007/978-3-319-13039-2_2
  3. Bauer Aurélie, Jaulmes Eliane, Prouff Emmanuel, Wild Justine, Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations, Topics in Cryptology – CT-RSA 2013 (2013) ISBN:9783642360947 p.1-17, 10.1007/978-3-642-36095-4_1
  4. Bauer Aurélie, Jaulmes Eliane, Prouff Emmanuel, Wild Justine, Horizontal Collision Correlation Attack on Elliptic Curves, Selected Areas in Cryptography -- SAC 2013 (2014) ISBN:9783662434130 p.553-570, 10.1007/978-3-662-43414-7_28
  5. Benger Naomi, van de Pol Joop, Smart Nigel P., Yarom Yuval, “Ooh Aah... Just a Little Bit” : A Small Amount of Side Channel Can Go a Long Way, Lecture Notes in Computer Science (2014) ISBN:9783662447086 p.75-92, 10.1007/978-3-662-44709-3_5
  6. Bernstein, D.J., Lange, T., van Vredendaal, C.: Tighter, faster, simpler side-channel security evaluations beyond computing power. IACR Cryptology ePrint Archive, 2015:221 (2015)
  7. Brier Eric, Clavier Christophe, Olivier Francis, Correlation Power Analysis with a Leakage Model, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.16-29, 10.1007/978-3-540-28632-5_2
  8. Chari Suresh, Rao Josyula R., Rohatgi Pankaj, Template Attacks, Cryptographic Hardware and Embedded Systems - CHES 2002 (2003) ISBN:9783540004097 p.13-28, 10.1007/3-540-36400-5_3
  9. Chen Chien-Ning, Memory Address Side-Channel Analysis on Exponentiation, Information Security and Cryptology - ICISC 2014 (2015) ISBN:9783319159423 p.421-432, 10.1007/978-3-319-15943-0_25
  10. Clavier Christophe, Feix Benoit, Gagnerot Georges, Giraud Christophe, Roussellet Mylène, Verneuil Vincent, ROSETTA for Single Trace Analysis, Lecture Notes in Computer Science (2012) ISBN:9783642349300 p.140-155, 10.1007/978-3-642-34931-7_9
  11. Clavier Christophe, Feix Benoit, Gagnerot Georges, Roussellet Mylène, Verneuil Vincent, Horizontal Correlation Analysis on Exponentiation, Information and Communications Security (2010) ISBN:9783642176494 p.46-61, 10.1007/978-3-642-17650-0_5
  12. Clavier Christophe, Joye Marc, Universal Exponentiation Algorithm A First Step towards Provable SPA-Resistance, Cryptographic Hardware and Embedded Systems — CHES 2001 (2001) ISBN:9783540425212 p.300-308, 10.1007/3-540-44709-1_25
  13. Coron Jean-Sébastien, Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems (1999) ISBN:9783540666462 p.292-302, 10.1007/3-540-48059-5_25
  14. Danger Jean-Luc, Guilley Sylvain, Hoogvorst Philippe, Murdica Cédric, Naccache David, Improving the Big Mac Attack on Elliptic Curve Cryptography, The New Codebreakers (2016) ISBN:9783662493007 p.374-386, 10.1007/978-3-662-49301-4_23
  15. The FPLLL development team. fplll, a lattice reduction library (2016).
  16. Dugardin Margaux, Papachristodoulou Louiza, Najm Zakaria, Batina Lejla, Danger Jean-Luc, Guilley Sylvain, Dismantling Real-World ECC with Horizontal and Vertical Template Attacks, Constructive Side-Channel Analysis and Secure Design (2016) ISBN:9783319432823 p.88-108, 10.1007/978-3-319-43283-0_6
  17. Durvaux François, Standaert François-Xavier, From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces, Advances in Cryptology – EUROCRYPT 2016 (2016) ISBN:9783662498897 p.240-262, 10.1007/978-3-662-49890-3_10
  18. Durvaux François, Standaert François-Xavier, Del Pozo Santos Merino, Towards easy leakage certification: extended version, 10.1007/s13389-017-0150-0
  19. Durvaux François, Standaert François-Xavier, Veyrat-Charvillon Nicolas, How to Certify the Leakage of a Chip?, Advances in Cryptology – EUROCRYPT 2014 (2014) ISBN:9783642552199 p.459-476, 10.1007/978-3-642-55220-5_26
  20. Glowacz Cezary, Grosso Vincent, Poussier Romain, Schüth Joachim, Standaert François-Xavier, Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment, Fast Software Encryption (2015) ISBN:9783662481158 p.117-129, 10.1007/978-3-662-48116-5_6
  21. Hanley Neil, Kim HeeSeok, Tunstall Michael, Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace, Lecture Notes in Computer Science (2015) ISBN:9783319167145 p.431-448, 10.1007/978-3-319-16715-2_23
  22. Heyszl Johann, Mangard Stefan, Heinz Benedikt, Stumpf Frederic, Sigl Georg, Localized Electromagnetic Analysis of Cryptographic Implementations, Lecture Notes in Computer Science (2012) ISBN:9783642279539 p.231-244, 10.1007/978-3-642-27954-6_15
  23. Joye Marc, Tymen Christophe, Protections against Differential Analysis for Elliptic Curve Cryptography — An Algebraic Approach —, Cryptographic Hardware and Embedded Systems — CHES 2001 (2001) ISBN:9783540425212 p.377-390, 10.1007/3-540-44709-1_31
  24. Joye Marc, Yen Sung-Ming, The Montgomery Powering Ladder, Cryptographic Hardware and Embedded Systems - CHES 2002 (2003) ISBN:9783540004097 p.291-302, 10.1007/3-540-36400-5_22
  25. Kocher Paul C., Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Advances in Cryptology — CRYPTO ’96 (1996) ISBN:9783540615125 p.104-113, 10.1007/3-540-68697-5_9
  26. Kocher Paul, Jaffe Joshua, Jun Benjamin, Rohatgi Pankaj, Introduction to differential power analysis, 10.1007/s13389-011-0006-y
  27. Lange Tanja, van Vredendaal Christine, Wakker Marnix, Kangaroos in Side-Channel Attacks, Smart Card Research and Advanced Applications (2015) ISBN:9783319167626 p.104-121, 10.1007/978-3-319-16763-3_7
  28. Lerman Liran, Poussier Romain, Bontempi Gianluca, Markowitch Olivier, Standaert François-Xavier, Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis), Constructive Side-Channel Analysis and Secure Design (2015) ISBN:9783319214757 p.20-33, 10.1007/978-3-319-21476-4_2
  29. Longo J., De Mulder E., Page D., Tunstall M., SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip, Lecture Notes in Computer Science (2015) ISBN:9783662483237 p.620-640, 10.1007/978-3-662-48324-4_31
  30. Martin Daniel P., O’Connell Jonathan F., Oswald Elisabeth, Stam Martijn, Counting Keys in Parallel After a Side Channel Attack, Advances in Cryptology – ASIACRYPT 2015 (2015) ISBN:9783662487990 p.313-337, 10.1007/978-3-662-48800-3_13
  31. Medwed Marcel, Oswald Elisabeth, Template Attacks on ECDSA, Information Security Applications (2009) ISBN:9783642003059 p.14-27, 10.1007/978-3-642-00306-6_2
  32. Messerges Thomas S., Dabbish Ezzy A., Sloan Robert H., Power Analysis Attacks of Modular Exponentiation in Smartcards, Cryptographic Hardware and Embedded Systems (1999) ISBN:9783540666462 p.144-157, 10.1007/3-540-48059-5_14
  33. Nascimento, E., Chmielewski, L., Oswald, D., Schwabe, P.: Attacking embedded ECC implementations through cmov side channels. IACR Cryptology ePrint Archive, 2016:923 (2016)
  34. Nguyen Phong Q., Shparlinski Igor E., 10.1023/a:1025436905711
  35. Poussier Romain, Standaert François-Xavier, Grosso Vincent, Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach, Lecture Notes in Computer Science (2016) ISBN:9783662531396 p.61-81, 10.1007/978-3-662-53140-2_4
  36. NIST FIPS PUB. 186–2: Digital signature standard (dss). National Institute for Standards and Technology (2000)
  37. Schindler Werner, Lemke Kerstin, Paar Christof, A Stochastic Model for Differential Side Channel Cryptanalysis, Cryptographic Hardware and Embedded Systems – CHES 2005 (2005) ISBN:9783540284741 p.30-46, 10.1007/11545262_3
  38. Veyrat-Charvillon Nicolas, Gérard Benoît, Renauld Mathieu, Standaert François-Xavier, An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks, Selected Areas in Cryptography (2013) ISBN:9783642359989 p.390-406, 10.1007/978-3-642-35999-6_25
  39. Veyrat-Charvillon Nicolas, Gérard Benoît, Standaert François-Xavier, Security Evaluations beyond Computing Power, Advances in Cryptology – EUROCRYPT 2013 (2013) ISBN:9783642383472 p.126-141, 10.1007/978-3-642-38348-9_8
  40. Walter C. D., Sliding Windows Succumbs to Big Mac Attack, Cryptographic Hardware and Embedded Systems — CHES 2001 (2001) ISBN:9783540425212 p.286-299, 10.1007/3-540-44709-1_24