Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Power Analysis Attacks - MaRDI portal

Power Analysis Attacks

From MaRDI portal
Publication:5201284

DOI10.1007/978-0-387-38162-6zbMath1131.68449OpenAlexW4240560709MaRDI QIDQ5201284

Thomas Popp, Elisabeth Oswald, Stefan Mangard

Publication date: 13 April 2006

Full work available at URL: https://doi.org/10.1007/978-0-387-38162-6




Related Items (max. 100)

Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \)Localized Electromagnetic Analysis of Cryptographic ImplementationsGetting More from PCA: First Results of Using Principal Component Analysis for Extensive Power AnalysisCorrelation power analysis and higher-order masking implementation of WAGEOn the influence of optimizers in deep learning-based side-channel analysisWhen Similarities Among Devices are Taken for Granted: Another Look at PortabilityLow-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR ProcessorsMultivariate Leakage Model for Improving Non-profiling DPA on Noisy Power TracesScore-Based vs. Probability-Based Enumeration – A Cautionary NoteOn using RSA/ECC coprocessor for ideal lattice-based key exchangeA Leakage Resilient MACSide-channeling the \textsf{Kalyna} key expansionEnabling 3-Share Threshold Implementations for all 4-Bit S-BoxesProtecting Ring Oscillator Physical Unclonable Functions Against Modeling AttacksDesign methodology and validity verification for a reactive countermeasure against EM attacksAcoustic cryptanalysisSide-channel cryptographic attacks using pseudo-Boolean optimizationRemote IP Protection Using Timing ChannelsOn Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert LeakagesComplementing Feistel CiphersAttacks and Security Proofs of EAX-PrimeMasking Tables—An Underestimated Security RiskThreshold implementations of small S-boxesThe distributions of individual bits in the output of multiplicative operationsMasking and leakage-resilient primitives: one, the other(s) or both?Improved power analysis attacks on FalconSpin me right round rotational symmetry for FPGA-specific AES: extended versionFocus is key to success: a focal loss function for deep learning-based side-channel analysisOn the evaluation of deep learning-based side-channel analysisOn the feasibility of single-trace attacks on the Gaussian sampler using a CDT\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryptionSide-Channel Analysis Protection and Low-Latency in ActionTaylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled ImplementationsGeneralized probabilistic satisfiability and applications to modelling attackers with side-channel capabilitiesOn the exact relationship between the mutual information metric and the success rate metricProuff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage modelDEFAULT: cipher level resistance against differential fault attackA third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blindingDetecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacksA side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomialLearning with physical rounding for linear and quadratic leakage functionsBeyond birthday bound secure fresh rekeying: application to authenticated encryptionSide channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementationFirst-order side channel attacks on Zhang's countermeasuresHiding Higher-Order Side-Channel LeakageUnifying leakage models: from probing attacks to noisy leakageTwo improved multiple-differential collision attacksMutual information analysis: a comprehensive studySecure hardware implementation of nonlinear functions in the presence of glitchesSide-channel resistant crypto for less than 2,300 GEFaster Addition and Doubling on Elliptic CurvesSliding-window correlation attacks against encryption devices with an unstable clockProfiled power analysis attacks using convolutional neural networks with domain knowledgeTrace-based schedulability analysis to enhance passive side-channel attack resilience of embedded softwareOn Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel AnalysisOn the Use of Independent Component Analysis to Denoise Side-Channel MeasurementsProtecting Triple-DES Against DPAThreshold Implementation in SoftwareCryptanalysis of a Chaotic Block Cryptographic System Against Template AttacksThere Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel AttacksMemory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate RepresentationQuantum key search with side channel adviceCategorising and comparing cluster-based DPA distinguishersCombined Attack on CRT-RSASpectral Approach for Correlation Power AnalysisMaking masking security proofs concrete (or how to evaluate the security of any leaking device), extended versionHigher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEONExploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single TraceDifferential Power Analysis of a McEliece CryptosystemArithmetic Addition over Boolean MaskingA Theoretical Study of Kolmogorov-Smirnov DistinguishersOn the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel ResistanceChipWhisperer: An Open-Source Platform for Hardware Embedded Security ResearchOn the Security of RSM - Presenting 5 First- and Second-Order AttacksOn hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitivesBuying AES Design Resistance with Speed and EnergyPhotonic Power FirewallsImproving Differential Power Analysis by Elastic AlignmentSusceptibility of UHF RFID Tags to Electromagnetic AnalysisAffine Equivalence and Its Application to Tightening Threshold ImplementationsNear Collision Side Channel AttacksPractical Attacks on Masked HardwareImproving DPA by Peak Distribution AnalysisAffine Masking against Higher-Order Side Channel AnalysisRandom Order m-ary ExponentiationMultivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic ApplicationsExponent Recoding and Regular Exponentiation AlgorithmsOn the Exact Success Rate of Side Channel Analysis in the Gaussian ModelTowards Sound Fresh Re-keying with Hard (Physical) Learning ProblemsPKDPA: An Enhanced Probabilistic Differential Power Attack MethodologyFormal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel AttacksNovel true random number generator based hardware cryptographic architecture using quantum-dot cellular automataHadamard matrices, \(d\)-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weightsTransparency order for Boolean functions: analysis and constructionMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle\textsf{Scatter}: a missing case?Differential power analysis of the Picnic signature scheme


Uses Software



This page was built for publication: Power Analysis Attacks