Power Analysis Attacks
From MaRDI portal
Publication:5201284
DOI10.1007/978-0-387-38162-6zbMath1131.68449OpenAlexW4240560709MaRDI QIDQ5201284
Thomas Popp, Elisabeth Oswald, Stefan Mangard
Publication date: 13 April 2006
Full work available at URL: https://doi.org/10.1007/978-0-387-38162-6
Introductory exposition (textbooks, tutorial papers, etc.) pertaining to computer science (68-01) Data encryption (aspects in computer science) (68P25)
Related Items (max. 100)
Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \) ⋮ Localized Electromagnetic Analysis of Cryptographic Implementations ⋮ Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis ⋮ Correlation power analysis and higher-order masking implementation of WAGE ⋮ On the influence of optimizers in deep learning-based side-channel analysis ⋮ When Similarities Among Devices are Taken for Granted: Another Look at Portability ⋮ Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors ⋮ Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces ⋮ Score-Based vs. Probability-Based Enumeration – A Cautionary Note ⋮ On using RSA/ECC coprocessor for ideal lattice-based key exchange ⋮ A Leakage Resilient MAC ⋮ Side-channeling the \textsf{Kalyna} key expansion ⋮ Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes ⋮ Protecting Ring Oscillator Physical Unclonable Functions Against Modeling Attacks ⋮ Design methodology and validity verification for a reactive countermeasure against EM attacks ⋮ Acoustic cryptanalysis ⋮ Side-channel cryptographic attacks using pseudo-Boolean optimization ⋮ Remote IP Protection Using Timing Channels ⋮ On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages ⋮ Complementing Feistel Ciphers ⋮ Attacks and Security Proofs of EAX-Prime ⋮ Masking Tables—An Underestimated Security Risk ⋮ Threshold implementations of small S-boxes ⋮ The distributions of individual bits in the output of multiplicative operations ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ Improved power analysis attacks on Falcon ⋮ Spin me right round rotational symmetry for FPGA-specific AES: extended version ⋮ Focus is key to success: a focal loss function for deep learning-based side-channel analysis ⋮ On the evaluation of deep learning-based side-channel analysis ⋮ On the feasibility of single-trace attacks on the Gaussian sampler using a CDT ⋮ \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption ⋮ Side-Channel Analysis Protection and Low-Latency in Action ⋮ Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations ⋮ Generalized probabilistic satisfiability and applications to modelling attackers with side-channel capabilities ⋮ On the exact relationship between the mutual information metric and the success rate metric ⋮ Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model ⋮ DEFAULT: cipher level resistance against differential fault attack ⋮ A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding ⋮ Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks ⋮ A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial ⋮ Learning with physical rounding for linear and quadratic leakage functions ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation ⋮ First-order side channel attacks on Zhang's countermeasures ⋮ Hiding Higher-Order Side-Channel Leakage ⋮ Unifying leakage models: from probing attacks to noisy leakage ⋮ Two improved multiple-differential collision attacks ⋮ Mutual information analysis: a comprehensive study ⋮ Secure hardware implementation of nonlinear functions in the presence of glitches ⋮ Side-channel resistant crypto for less than 2,300 GE ⋮ Faster Addition and Doubling on Elliptic Curves ⋮ Sliding-window correlation attacks against encryption devices with an unstable clock ⋮ Profiled power analysis attacks using convolutional neural networks with domain knowledge ⋮ Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software ⋮ On Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel Analysis ⋮ On the Use of Independent Component Analysis to Denoise Side-Channel Measurements ⋮ Protecting Triple-DES Against DPA ⋮ Threshold Implementation in Software ⋮ Cryptanalysis of a Chaotic Block Cryptographic System Against Template Attacks ⋮ There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks ⋮ Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation ⋮ Quantum key search with side channel advice ⋮ Categorising and comparing cluster-based DPA distinguishers ⋮ Combined Attack on CRT-RSA ⋮ Spectral Approach for Correlation Power Analysis ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON ⋮ Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace ⋮ Differential Power Analysis of a McEliece Cryptosystem ⋮ Arithmetic Addition over Boolean Masking ⋮ A Theoretical Study of Kolmogorov-Smirnov Distinguishers ⋮ On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance ⋮ ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research ⋮ On the Security of RSM - Presenting 5 First- and Second-Order Attacks ⋮ On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives ⋮ Buying AES Design Resistance with Speed and Energy ⋮ Photonic Power Firewalls ⋮ Improving Differential Power Analysis by Elastic Alignment ⋮ Susceptibility of UHF RFID Tags to Electromagnetic Analysis ⋮ Affine Equivalence and Its Application to Tightening Threshold Implementations ⋮ Near Collision Side Channel Attacks ⋮ Practical Attacks on Masked Hardware ⋮ Improving DPA by Peak Distribution Analysis ⋮ Affine Masking against Higher-Order Side Channel Analysis ⋮ Random Order m-ary Exponentiation ⋮ Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications ⋮ Exponent Recoding and Regular Exponentiation Algorithms ⋮ On the Exact Success Rate of Side Channel Analysis in the Gaussian Model ⋮ Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems ⋮ PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology ⋮ Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks ⋮ Novel true random number generator based hardware cryptographic architecture using quantum-dot cellular automata ⋮ Hadamard matrices, \(d\)-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weights ⋮ Transparency order for Boolean functions: analysis and construction ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle ⋮ \textsf{Scatter}: a missing case? ⋮ Differential power analysis of the Picnic signature scheme
Uses Software
This page was built for publication: Power Analysis Attacks