User menu

How to compare profiled side-channel attacks?

Bibliographic reference Standaert, François-Xavier ; Koeune, François ; Schindler, W.. How to compare profiled side-channel attacks?.Annual Applied Cryptography and Network Security. 7th Annual Conference on Applied Cryptography and Network Security (Paris-Rocquencourt, France, 2-5 June 2009). In: Abdalla, M.; Pointcheval, D.; Fouque, P.-A.; Vergnaud, D.;, Annual Applied Cryptography and Network Security. 7th Annual Conference on Applied Cryptography and Network Security, Springer verlag2009, p. 485-498
Permanent URL http://hdl.handle.net/2078.1/67528
  1. Chari Suresh, Rao Josyula R., Rohatgi Pankaj, Template Attacks, Cryptographic Hardware and Embedded Systems - CHES 2002 (2003) ISBN:9783540004097 p.13-28, 10.1007/3-540-36400-5_3
  2. Gierlichs Benedikt, Lemke-Rust Kerstin, Paar Christof, Templates vs. Stochastic Methods, Lecture Notes in Computer Science (2006) ISBN:9783540465591 p.15-29, 10.1007/11894063_2
  3. Lemke-Rust Kerstin, Paar Christof, Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods, Computer Security – ESORICS 2007 ISBN:9783540748342 p.454-468, 10.1007/978-3-540-74835-9_30
  4. Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks. Springer, Heidelberg (2007)
  5. Schindler Werner, Lemke Kerstin, Paar Christof, A Stochastic Model for Differential Side Channel Cryptanalysis, Cryptographic Hardware and Embedded Systems – CHES 2005 (2005) ISBN:9783540284741 p.30-46, 10.1007/11545262_3
  6. Schindler Werner, Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking, 10.1515/jmc.2008.013
  7. Standaert, F.-X., Malkin, T.G., Yung, M.: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. To appear in the proceedings of Eurocrypt (2009); Extended version available from: Cryptology ePrint Archive, Report 2006/139
  8. Standaert F. -X., Peeters E., Archambeau C., Quisquater J. -J., Towards Security Limits in Side-Channel Attacks, Lecture Notes in Computer Science (2006) ISBN:9783540465591 p.30-45, 10.1007/11894063_3
  9. Standaert François-Xavier, Archambeau Cedric, Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, Cryptographic Hardware and Embedded Systems – CHES 2008 ISBN:9783540850526 p.411-425, 10.1007/978-3-540-85053-3_26