User menu

A unified framework for the analysis of side-channel key recovery attacks

Bibliographic reference Standaert, François-Xavier ; Malkin, T.G. ; Yung, M.. A unified framework for the analysis of side-channel key recovery attacks.Advances in Cryptology-EUROCRYPT 2009. 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Cologne, Germany, 26-30 April 2009). In: Joux, A.;, Advances in Cryptology-EUROCRYPT 2009. 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer-verlag2009, p. 443-461
Permanent URL http://hdl.handle.net/2078.1/67616
  1. Abraham D. G., Dolan G. M., Double G. P., Stevens J. V., Transaction Security System, 10.1147/sj.302.0206
  2. Agrawal Dakshi, Archambeault Bruce, Rao Josyula R., Rohatgi Pankaj, The EM Side—Channel(s), Cryptographic Hardware and Embedded Systems - CHES 2002 (2003) ISBN:9783540004097 p.29-45, 10.1007/3-540-36400-5_4
  3. Backes, M., Köpf, B.: Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks, IACR ePrint archive (2008), http://eprint.iacr.org/2008/162
  4. Archambeau C., Peeters E., Standaert F. -X., Quisquater J. -J., Template Attacks in Principal Subspaces, Lecture Notes in Computer Science (2006) ISBN:9783540465591 p.1-14, 10.1007/11894063_1
  5. Biryukov Alex, De Cannière Christophe, Quisquater Michaël, On Multiple Linear Approximations, Advances in Cryptology – CRYPTO 2004 (2004) ISBN:9783540226680 p.1-22, 10.1007/978-3-540-28628-8_1
  6. Cachin, C.: Entropy Measures and Unconditional Security in Cryptography, PhD Thesis, ETH Dissertation, num 12187, Zurich, Switzerland (1997)
  7. Chari Suresh, Rao Josyula R., Rohatgi Pankaj, Template Attacks, Cryptographic Hardware and Embedded Systems - CHES 2002 (2003) ISBN:9783540004097 p.13-28, 10.1007/3-540-36400-5_3
  8. Cryptographic Hardware and Embedded Systems, http://www.chesworkshop.org
  9. Application of Attack Potential to Smart Cards, Common Criteria Supporting Document, Version 1.1 (July 2002), http://www.commoncriteriaportal.org
  10. Cover, T.M., Thomas, J.A.: Information Theory. Wiley and Sons, New York (1991)
  11. Dziembowski Stefan, Pietrzak Krzysztof, Leakage-Resilient Cryptography, 10.1109/focs.2008.56
  12. ECRYPT Network of Excellence in Cryptology, The Side-Channel Cryptanalysis Lounge, http://www.crypto.ruhr-uni-bochum.de/en_sclounge.html
  13. FIPS 140-2, Security Requirements for Cryptographic Modules, Federal Information Processing Standard, NIST, U.S. Dept. of Commerce (December 3, 2002)
  14. Gandolfi Karine, Mourtel Christophe, Olivier Francis, Electromagnetic Analysis: Concrete Results, Cryptographic Hardware and Embedded Systems — CHES 2001 (2001) ISBN:9783540425212 p.251-261, 10.1007/3-540-44709-1_21
  15. Gennaro Rosario, Lysyanskaya Anna, Malkin Tal, Micali Silvio, Rabin Tal, Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering, Theory of Cryptography (2004) ISBN:9783540210009 p.258-277, 10.1007/978-3-540-24638-1_15
  16. Gierlichs Benedikt, Lemke-Rust Kerstin, Paar Christof, Templates vs. Stochastic Methods, Lecture Notes in Computer Science (2006) ISBN:9783540465591 p.15-29, 10.1007/11894063_2
  17. Ishai Yuval, Sahai Amit, Wagner David, Private Circuits: Securing Hardware against Probing Attacks, Advances in Cryptology - CRYPTO 2003 (2003) ISBN:9783540406747 p.463-481, 10.1007/978-3-540-45146-4_27
  18. Ishai Yuval, Prabhakaran Manoj, Sahai Amit, Wagner David, Private Circuits II: Keeping Secrets in Tamperable Circuits, Advances in Cryptology - EUROCRYPT 2006 (2006) ISBN:9783540345466 p.308-327, 10.1007/11761679_19
  19. Chari Suresh, Jutla Charanjit S., Rao Josyula R., Rohatgi Pankaj, Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.398-412, 10.1007/3-540-48405-1_26
  20. Köpf, B., Basin, D.: an Information Theoretic Model for Adaptive Side-Channel Attacks. In: The proceedings of ACMCCS 2007, Alexandria, VA, USA (October 2007)
  21. Macé François, Standaert François-Xavier, Quisquater Jean-Jacques, Information Theoretic Evaluation of Side-Channel Resistant Logic Styles, Cryptographic Hardware and Embedded Systems - CHES 2007 ISBN:9783540747345 p.427-442, 10.1007/978-3-540-74735-2_29
  22. Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks. Springer, Heidelberg (2007)
  23. Massey J.L., Guessing and entropy, 10.1109/isit.1994.394764
  24. Micali Silvio, Reyzin Leonid, Physically Observable Cryptography, Theory of Cryptography (2004) ISBN:9783540210009 p.278-296, 10.1007/978-3-540-24638-1_16
  25. Petit, C., Standaert, F.-X., Pereira, O., Malkin, T.G., Yung, M.: A Block Cipher based PRNG Secure Against Side-Channel Key Recovery. In: ASIACCS 2008, Tokyo, Japan, pp. 56–65 (March 2008)
  26. Pietrzak Krzysztof, A Leakage-Resilient Mode of Operation, Advances in Cryptology - EUROCRYPT 2009 (2009) ISBN:9783642010002 p.462-482, 10.1007/978-3-642-01001-9_27
  27. Schindler Werner, Lemke Kerstin, Paar Christof, A Stochastic Model for Differential Side Channel Cryptanalysis, Cryptographic Hardware and Embedded Systems – CHES 2005 (2005) ISBN:9783540284741 p.30-46, 10.1007/11545262_3
  28. Shannon C. E., A Mathematical Theory of Communication, 10.1002/j.1538-7305.1948.tb01338.x
  29. Shannon C. E., Communication Theory of Secrecy Systems*, 10.1002/j.1538-7305.1949.tb00928.x
  30. Standaert, F.-X., Malkin, T.G., Yung, M.: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version), Cryptology ePrint Archive, Report 2006/139
  31. Standaert F. -X., Peeters E., Archambeau C., Quisquater J. -J., Towards Security Limits in Side-Channel Attacks, Lecture Notes in Computer Science (2006) ISBN:9783540465591 p.30-45, 10.1007/11894063_3
  32. Standaert François-Xavier, Archambeau Cedric, Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, Cryptographic Hardware and Embedded Systems – CHES 2008 ISBN:9783540850526 p.411-425, 10.1007/978-3-540-85053-3_26
  33. Standaert François-Xavier, Gierlichs Benedikt, Verbauwhede Ingrid, Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices, Information Security and Cryptology – ICISC 2008 (2009) ISBN:9783642007293 p.253-267, 10.1007/978-3-642-00730-9_16