Statistical Analysis of Second Order Differential Power Analysis
From MaRDI portal
Publication:4974947
DOI10.1109/TC.2009.15zbMath1367.94339OpenAlexW2124785100MaRDI QIDQ4974947
Régis Bevan, Emmanuel Prouff, Matthieu Rivain
Publication date: 8 August 2017
Published in: IEEE Transactions on Computers (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tc.2009.15
Related Items (26)
A First-Order Leak-Free Masking Countermeasure ⋮ Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis ⋮ Higher-Order Side Channel Security and Mask Refreshing ⋮ Boosting Higher-Order Correlation Attacks by Dimensionality Reduction ⋮ Revisiting mutual information analysis: multidimensionality, neural estimation and optimality proofs ⋮ Horizontal collision correlation attack on elliptic curves ⋮ Spin me right round rotational symmetry for FPGA-specific AES: extended version ⋮ Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations ⋮ Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations ⋮ Secure Implementation of Lattice-Based Encryption Schemes ⋮ Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks ⋮ Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms ⋮ On some connections between statistics and cryptology ⋮ Mutual information analysis: a comprehensive study ⋮ On the Use of Independent Component Analysis to Denoise Side-Channel Measurements ⋮ SCATTER: A New Dimension in Side-Channel ⋮ There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks ⋮ Redefining the transparency order ⋮ Multivariate high-order attacks of shuffled tables recomputation ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ Codes for Side-Channel Attacks and Protections ⋮ Affine Masking against Higher-Order Side Channel Analysis ⋮ Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks ⋮ \textsf{Scatter}: a missing case? ⋮ On the implementation efficiency of linear regression-based side-channel attacks ⋮ Complementary dual codes for counter-measures to side-channel attacks
This page was built for publication: Statistical Analysis of Second Order Differential Power Analysis