User menu

Accès à distance ? S'identifier sur le proxy UCLouvain

Towards Sound and Optimal Leakage Detection Procedure

  • Open access
  • PDF
  • 464.46 K
  1. Goodwill, G., Jun, B., Jaffe, J., Rohatgi, P.: A testing methodology for side-channel resistance validation. In: NIST Non-Invasive Attack Testing Workshop, September 2011. http://csrc.nist.gov/news_events/non-invasive-attack-testing-workshop/papers/08_Goodwill.pdf
  2. Cooper, J., DeMulder, E., Goodwill, G., Jaffe, J., Kenworthy, G., Rohatgi, P.: Test vector leakage assessment (TVLA) methodology in practice. In: International Cryptographic Module Conference (2013). http://icmc-2013.org/wp/wp-content/uploads/2013/09/goodwillkenworthtestvector.pdf
  3. Mather Luke, Oswald Elisabeth, Bandenburg Joe, Wójcik Marcin, Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests, Advances in Cryptology - ASIACRYPT 2013 (2013) ISBN:9783642420320 p.486-505, 10.1007/978-3-642-42033-7_25
  4. Schneider Tobias, Moradi Amir, Leakage Assessment Methodology, Lecture Notes in Computer Science (2015) ISBN:9783662483237 p.495-513, 10.1007/978-3-662-48324-4_25
  5. Durvaux François, Standaert François-Xavier, From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces, Advances in Cryptology – EUROCRYPT 2016 (2016) ISBN:9783662498897 p.240-262, 10.1007/978-3-662-49890-3_10
  6. Ding A. Adam, Chen Cong, Eisenbarth Thomas, Simpler, Faster, and More Robust T-Test Based Leakage Detection, Constructive Side-Channel Analysis and Secure Design (2016) ISBN:9783319432823 p.163-183, 10.1007/978-3-319-43283-0_10
  7. Bilgin Begül, Gierlichs Benedikt, Nikova Svetla, Nikov Ventzislav, Rijmen Vincent, Higher-Order Threshold Implementations, Lecture Notes in Computer Science (2014) ISBN:9783662456071 p.326-343, 10.1007/978-3-662-45608-8_18
  8. Nascimento Erick, López Julio, Dahab Ricardo, Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers, Security, Privacy, and Applied Cryptography Engineering (2015) ISBN:9783319241258 p.289-309, 10.1007/978-3-319-24126-5_17
  9. De Cnudde Thomas, Bilgin Begül, Reparaz Oscar, Nikova Svetla, Higher-Order Glitch Resistant Implementation of the PRESENT S-Box, Cryptography and Information Security in the Balkans (2015) ISBN:9783319213552 p.75-93, 10.1007/978-3-319-21356-9_6
  10. Balasch Josep, Gierlichs Benedikt, Grosso Vincent, Reparaz Oscar, Standaert François-Xavier, On the Cost of Lazy Engineering for Masked Software Implementations, Smart Card Research and Advanced Applications (2015) ISBN:9783319167626 p.64-81, 10.1007/978-3-319-16763-3_5
  11. Jin Jiashun, Donoho David, Higher criticism for detecting sparse heterogeneous mixtures, 10.1214/009053604000000265
  12. Donoho D., Jin J., Higher criticism thresholding: Optimal feature selection when useful features are rare and weak, 10.1073/pnas.0807471105
  13. Robert C. P., Wood A. T. A., Report of the Editors-2007 : Editors’ Report, 10.1111/j.1467-9868.2007.00626.x
  14. Fan Jianqing, Feng Yang, Song Rui, Nonparametric Independence Screening in Sparse Ultra-High-Dimensional Additive Models, 10.1198/jasa.2011.tm09779
  15. Li Jian, Siegmund David, Higher criticism: $p$-values and criticism, 10.1214/15-aos1312
  16. Donoho David, Jin Jiashun, Higher Criticism for Large-Scale Inference, Especially for Rare and Weak Effects, 10.1214/14-sts506
  17. Wu Zheyang, Sun Yiming, He Shiquan, Cho Judy, Zhao Hongyu, Jin Jiashun, Detection boundary and Higher Criticism approach for rare and weak genetic effects, 10.1214/14-aoas724
  18. Ingster, Y.I.: Minimax detection of a signal for i (n)-balls. Math. Methods Stat. 7(4), 401–428 (1998)
  19. Archambeau C., Peeters E., Standaert F. -X., Quisquater J. -J., Template Attacks in Principal Subspaces, Lecture Notes in Computer Science (2006) ISBN:9783540465591 p.1-14, 10.1007/11894063_1
  20. Standaert François-Xavier, Archambeau Cedric, Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, Cryptographic Hardware and Embedded Systems – CHES 2008 ISBN:9783540850526 p.411-425, 10.1007/978-3-540-85053-3_26
  21. Bär, M., Drexler, H., Pulkus, J.: Improved template attacks. In: International Workshop on Constructive Side-Channel Analysis and Secure Design (2010)
  22. Elaabid M. Abdelaziz, Meynard Olivier, Guilley Sylvain, Danger Jean-Luc, Combined Side-Channel Attacks, Information Security Applications (2011) ISBN:9783642179549 p.175-190, 10.1007/978-3-642-17955-6_13
  23. Choudary Omar, Kuhn Markus G., Efficient Template Attacks, Smart Card Research and Advanced Applications (2014) ISBN:9783319083018 p.253-270, 10.1007/978-3-319-08302-5_17
  24. Bruneau Nicolas, Guilley Sylvain, Heuser Annelie, Marion Damien, Rioul Olivier, Less is More, Lecture Notes in Computer Science (2015) ISBN:9783662483237 p.22-41, 10.1007/978-3-662-48324-4_2
  25. Zhang, L., Ding, A.A., Durvaux, F., Standaert, F.-X., Fei, Y.: Towards sound and optimal leakage detection procedure, Cryptology ePrint Archive, Report 2017/287 (2017). http://eprint.iacr.org/2017/287
  26. Testing Statistical Hypotheses, ISBN:9780387988641, 10.1007/0-387-27605-x
  27. Hall Peter, Jin Jiashun, Properties of higher criticism under strong dependence, 10.1214/009053607000000767
  28. Barnett Ian, Mukherjee Rajarshi, Lin Xihong, The Generalized Higher Criticism for Testing SNP-Set Effects in Genetic Association Studies, 10.1080/01621459.2016.1192039
  29. Mangard S., Oswald E., Standaert F.-X., One for all – all for one: unifying standard differential power analysis attacks, 10.1049/iet-ifs.2010.0096
  30. Testbed for side channel analysis and security evaluation (2014). http://tescase.coe.neu.edu
  31. Akkar Mehdi-Laurent, Giraud Christophe, An Implementation of DES and AES, Secure against Some Attacks, Cryptographic Hardware and Embedded Systems — CHES 2001 (2001) ISBN:9783540425212 p.309-318, 10.1007/3-540-44709-1_26
  32. Chari Suresh, Jutla Charanjit S., Rao Josyula R., Rohatgi Pankaj, Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.398-412, 10.1007/3-540-48405-1_26
  33. Schramm Kai, Paar Christof, Higher Order Masking of the AES, Topics in Cryptology – CT-RSA 2006 (2006) ISBN:9783540310334 p.208-225, 10.1007/11605805_14
  34. Prouff E., Rivain M., Bevan R., Statistical Analysis of Second Order Differential Power Analysis, 10.1109/tc.2009.15
  35. Ding A. Adam, Zhang Liwei, Fei Yunsi, Luo Pei, A Statistical Model for Higher Order DPA on Masked Devices, Advanced Information Systems Engineering (2014) ISBN:9783642387081 p.147-169, 10.1007/978-3-662-44709-3_9
Bibliographic reference Ding, A. Adam ; Zhang, Liwei ; Durvaux, François ; Standaert, François-Xavier ; Fei, Yunsi. Towards Sound and Optimal Leakage Detection Procedure.16th International Conference on Smart Card Research and Advanced Applications (CARDIS 2017) (Lugano (Switzerland), du 13/11/2017 au 15/11/2017). In: Proceedings of CARDIS 2017, 2017
Permanent URL http://hdl.handle.net/2078.1/210684