Statistical properties of side-channel and fault injection attacks using coding theory
DOI10.1007/s12095-017-0271-4OpenAlexW2774568542MaRDI QIDQ1749798
Sylvain Guilley, Claude Carlet
Publication date: 28 May 2018
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-017-0271-4
masking countermeasuredetection of faultsbounded moment security modelhigh-order attacksinner product maskingleakage squeezing maskingprobing security modelstatistics of leakageuni- and multi-variate side-channel attacks
Applications of statistics in engineering and industry; control charts (62P30) Statistical aspects of information-theoretic topics (62B10)
Related Items (8)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Complementary dual codes for counter-measures to side-channel attacks
- Fault analysis in cryptography. Foreword by Dan Boneh
- Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part I
- Mutual information analysis: a comprehensive study
- Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
- Leakage squeezing: optimal implementation and security evaluation
- Multi-variate high-order attacks of shuffled tables recomputation
- ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
- Leakage Squeezing Using Cellular Automata
- Leakage Squeezing of Order Two
- Statistical Tools Flavor Side-Channel Collision Attacks
- Optimal First-Order Masking with Linear and Non-linear Bijections
- Masks Will Fall Off
- Masking Tables—An Underestimated Security Risk
- Verified Proofs of Higher-Order Masking
- Inner Product Masking Revisited
- Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions
- A New Class of Codes for Boolean Masking of Cryptographic Computations
- The World Is Not Enough: Another Look on Second-Order DPA
- Horizontal Correlation Analysis on Exponentiation
- Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks
- A Fast and Provably Secure Higher-Order Masking of AES S-Box
- Correlation-Immune Boolean Functions for Leakage Squeezing and Rotating S-Box Masking against Side Channel Attacks
- Algebraic Decomposition for Probing Security
- A Key to Success
- Provably Secure Higher-Order Masking of AES
- Higher-Order Masking Schemes for S-Boxes
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Higher Order Masking of Look-Up Tables
- Advances in Cryptology - CRYPTO 2003
- Selected Areas in Cryptography
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Codes for Side-Channel Attacks and Protections
- Topics in Cryptology – CT-RSA 2006
This page was built for publication: Statistical properties of side-channel and fault injection attacks using coding theory