Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Statistical Analysis of Second Order Differential Power Analysis - MaRDI portal

Statistical Analysis of Second Order Differential Power Analysis

From MaRDI portal
Publication:4974947

DOI10.1109/TC.2009.15zbMath1367.94339OpenAlexW2124785100MaRDI QIDQ4974947

Régis Bevan, Emmanuel Prouff, Matthieu Rivain

Publication date: 8 August 2017

Published in: IEEE Transactions on Computers (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1109/tc.2009.15




Related Items (26)

A First-Order Leak-Free Masking CountermeasureCryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power AnalysisHigher-Order Side Channel Security and Mask RefreshingBoosting Higher-Order Correlation Attacks by Dimensionality ReductionRevisiting mutual information analysis: multidimensionality, neural estimation and optimality proofsHorizontal collision correlation attack on elliptic curvesSpin me right round rotational symmetry for FPGA-specific AES: extended versionCharacterisation and Estimation of the Key Rank Distribution in the Context of Side Channel EvaluationsTaylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled ImplementationsSecure Implementation of Lattice-Based Encryption SchemesDetecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacksBridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histogramsOn some connections between statistics and cryptologyMutual information analysis: a comprehensive studyOn the Use of Independent Component Analysis to Denoise Side-Channel MeasurementsSCATTER: A New Dimension in Side-ChannelThere Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel AttacksRedefining the transparency orderMultivariate high-order attacks of shuffled tables recomputationParallel Implementations of Masking Schemes and the Bounded Moment Leakage ModelCodes for Side-Channel Attacks and ProtectionsAffine Masking against Higher-Order Side Channel AnalysisFormal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks\textsf{Scatter}: a missing case?On the implementation efficiency of linear regression-based side-channel attacksComplementary dual codes for counter-measures to side-channel attacks




This page was built for publication: Statistical Analysis of Second Order Differential Power Analysis