User menu

Univariate side channel attacks and leakage modeling

Bibliographic reference Doget, Julien ; Prouff, Emmanuel ; Rivain, Matthieu ; Standaert, François-Xavier. Univariate side channel attacks and leakage modeling. In: Journal of Cryptographic Engineering, Vol. 1, no. 2, p. 123-144 (2011)
Permanent URL
  1. Kocher P., Jaffe J., Jun B.: Differential power analysis. In: Wiener, M. (eds) Advances in Cryptology—CRYPTO ’99. Lecture Notes in Computer Science, vol. 1666, pp. 388–397. Springer, Berlin (1999)
  2. Messerges Thomas S., Using Second-Order Power Analysis to Attack DPA Resistant Software, Cryptographic Hardware and Embedded Systems — CHES 2000 (2000) ISBN:9783540414551 p.238-251, 10.1007/3-540-44499-8_19
  3. Brier Eric, Clavier Christophe, Olivier Francis, Correlation Power Analysis with a Leakage Model, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.16-29, 10.1007/978-3-540-28632-5_2
  4. Le Thanh-Ha, Clédière Jessy, Canovas Cécile, Robisson Bruno, Servière Christine, Lacoume Jean-Louis, A Proposition for Correlation Power Analysis Enhancement, Lecture Notes in Computer Science (2006) ISBN:9783540465591 p.174-186, 10.1007/11894063_14
  5. Bévan R., Knudsen E.: Ways to enhance power analysis. In: Lee, P., Lim, C. (eds) Information Security and Cryptology—ICISC 2002. Lecture Notes in Computer Science, vol. 2587, pp. 327–342. Springer, Berlin (2002)
  6. Mangard, S., Oswald, E., Standaert, F.X.: One for All—All for One: Unifying Standard DPA Attacks. Cryptology ePrint Archive, Report 2009/449 (2009). , to appear in IET Information Security
  7. Schindler W., Lemke K., Paar C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J., Sunar, B. (eds) Cryptographic hardware and embedded systems—CHES 2005. Lecture Notes in Computer Science, vol 3659., Springer, Berlin (2005)
  8. Messerges, T.: Power analysis attacks and countermeasures for cryptographic algorithms. PhD thesis, University of Illinois (2000)
  9. Brier, E., Clavier, C., Olivier, F.: Optimal statistical power analysis. Cryptology ePrint Archive, Report 2003/152 (2003)
  10. Coron, J.S., Giraud, C., Prouff, E., Rivain, M.: Attack and improvement of a secure s-box calculation based on the Fourier transform. [23] 1–14
  11. Golić J., Tymen C.: Multiplicative masking and power analysis of AES. In: Kaliski, B., Koç, Ç., Paar, C. (eds) Cryptographic Hardware and Embedded Systems—CHES 2002. Lecture Notes in Computer Science, vol. 2523, pp. 198–212. Springer, Berlin (2002)
  12. Standaert F.X., Gierlichs B., Verbauwhede I.: Partition vs. comparison side-channel distinguishers: an empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected CMOS devices. In: Lee, P.J., Cheon, J.H. (eds) Information Security and Cryptology—ICISC 2008 Lecture Notes in Computer Science, vol 5461., pp. 253–267. Springer, Berlin (2008)
  13. Prouff E., Rivain M., Bevan R., Statistical Analysis of Second Order Differential Power Analysis, 10.1109/tc.2009.15
  14. Mangard S., Oswald E., Popp T.: Power Analysis Attacks—Revealing the Secrets of Smartcards. Springer, Berlin (2007)
  15. Lemke-Rust, K.: Models and algorithms for physical cryptanalysis. PhD thesis, Ruhr-Universität-Bochum, Germany (2007)
  16. Renauld, M., Standaert, F.X., Veyrat-Charvillon, N., Kamel, D., Flandre, D.: A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices. Advances in Cryptology—EUROCRYPT 2011 (2011)
  17. Chunjie Duan, Calle V.H.C., Khatri S.P., Efficient On-Chip Crosstalk Avoidance CODEC Design, 10.1109/tvlsi.2008.2005313
  18. Moll Francesc, Roca Miquel, Isern Eugeni, Analysis of dissipation energy of switching digital CMOS gates with coupled outputs, 10.1016/s0026-2692(03)00133-2
  19. Agrawal Dakshi, Rao Josyula R., Rohatgi Pankaj, Multi-channel Attacks, Lecture Notes in Computer Science (2003) ISBN:9783540408338 p.2-16, 10.1007/978-3-540-45238-6_2
  20. Bishop C.M.: Pattern Recognition and Machine Learning (Information Science and Statistics), 1 edn. Springer, Berlin (2007)
  21. Mangard S.: Hardware countermeasures against DPA—a statistical analysis of their effectiveness. In: Okamoto, T. (eds) Topics in Cryptology—CT-RSA 2004. Lecture Notes in Computer Science, vol. 2964, pp. 222–235. Springer, Berlin (2004)
  22. Standaert, F.X., Archambeau, C.: Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, [23] pp. 411–425
  23. Oswald, E., Rohatgi, P. (eds.) Cryptographic Hardware and Embedded Systems—CHES 2008. In: Oswald, E., Rohatgi, P. (eds.) Proceedings of 10th International Workshop, Washington, DC, USA, August 10–13, 2008. Lecture Notes in Computer Science, vol. 5154. Springer, Berlin (2008)