Mutual information analysis: a comprehensive study
From MaRDI portal
Publication:656515
DOI10.1007/s00145-010-9084-8zbMath1239.94032OpenAlexW2145267250WikidataQ58765152 ScholiaQ58765152MaRDI QIDQ656515
Emmanuel Prouff, Matthieu Rivain, Nicolas Veyrat-Charvillon, Lejla Batina, Benedikt Gierlichs, François-Xavier Standaert
Publication date: 18 January 2012
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-1321.pdf
probability density estimationside-channel analysishigher-order attacksmasking countermeasuremutual information analysis
Related Items (15)
Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces ⋮ Revisiting mutual information analysis: multidimensionality, neural estimation and optimality proofs ⋮ Threshold implementations of small S-boxes ⋮ Horizontal collision correlation attack on elliptic curves ⋮ Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations ⋮ On the exact relationship between the mutual information metric and the success rate metric ⋮ PAC privacy: automatic privacy measurement and control of data processing ⋮ Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms ⋮ Statistical properties of side-channel and fault injection attacks using coding theory ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks ⋮ Fuzzy matching template attacks on multivariate cryptography: a case study ⋮ \textsf{Scatter}: a missing case? ⋮ Integrating side channel security in the FPGA hardware design flow ⋮ Measuring the asymmetric contributions of individual subsystems
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The World Is Not Enough: Another Look on Second-Order DPA
- On optimal and data-based histograms
- Information Theoretical Analysis of Multivariate Correlation
- On optimal data-based bandwidth selection in kernel density estimation
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Gaussian Mixture Models for Higher-Order Side Channel Analysis
- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Differential Cluster Analysis
- Mutual Information Analysis: How, When and Why?
- On the histogram as a density estimator:L 2 theory
- Towards sound approaches to counteract power-analysis attacks
- Statistical Analysis of Second Order Differential Power Analysis
- Revisiting Higher-Order DPA Attacks:
- Power Analysis Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
This page was built for publication: Mutual information analysis: a comprehensive study