메뉴 건너뛰기




Volumn 1, Issue 2, 2011, Pages 123-144

Univariate side channel attacks and leakage modeling

Author keywords

Correlation; Model; Regression; Side channel attack

Indexed keywords

CORRELATION METHODS; EFFICIENCY; MODELS;

EID: 83755165071     PISSN: 21908508     EISSN: 21908516     Source Type: Journal    
DOI: 10.1007/s13389-011-0010-2     Document Type: Article
Times cited : (148)

References (23)
  • 1
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • M. Wiener (Ed.), Berlin: Springer, Lecture Notes in Computer Science
    • Kocher P., Jaffe J., Jun B.: Differential power analysis. In: Wiener, M. (eds) Advances in Cryptology-CRYPTO '99. Lecture Notes in Computer Science, vol. 1666, pp. 388-397. Springer, Berlin (1999).
    • (1999) Advances in Cryptology-CRYPTO '99 , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 2
    • 68549099555 scopus 로고    scopus 로고
    • Using second-order power analysis to attack DPA resistant software
    • Ç. Koç and C. Paar (Eds.), Berlin: Springer, Lecture Notes in Computer Science
    • Messerges T.: Using second-order power analysis to attack DPA resistant software. In: Koç, Ç., Paar, C. (eds) Cryptographic Hardware and Embedded Systems-CHES 2000. Lecture Notes in Computer Science, vol. 1965., pp. 238-251. Springer, Berlin (2000).
    • (2000) Cryptographic Hardware and Embedded Systems-CHES 2000 , vol.1965 , pp. 238-251
    • Messerges, T.1
  • 3
    • 35048818034 scopus 로고    scopus 로고
    • Correlation power analysis with a leakage model
    • M. Joye and J. J. Quisquater (Eds.), Berlin: Springer, Lecture Notes in Computer Science
    • Brier E., Clavier C., Olivier F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J. J. (eds) Cryptographic Hardware and Embedded Systems-CHES 2004 Lecture Notes in Computer Science, vol 3156., pp. 16-29. Springer, Berlin (2004).
    • (2004) Cryptographic Hardware and Embedded Systems-CHES 2004 , vol.3156 , pp. 16-29
    • Brier, E.1    Clavier, C.2    Olivier, F.3
  • 4
    • 33750688820 scopus 로고    scopus 로고
    • A proposition for correlation power analysis enhancement
    • L. Goubin and M. Matsui (Eds.), Berlin: Springer, Lecture Notes in Computer Science
    • Le T. H., Clédière J., Canovas C., Robisson B., Servière C., Lacoume J. L.: A proposition for correlation power analysis enhancement. In: Goubin, L., Matsui, M. (eds) Cryptographic Hardware and Embedded Systems-CHES 2006. Lecture Notes in Computer Science, vol. 4249, pp. 174-186. Springer, Berlin (2006).
    • (2006) Cryptographic Hardware and Embedded Systems-CHES 2006 , vol.4249 , pp. 174-186
    • Le, T.H.1    Clédière, J.2    Canovas, C.3    Robisson, B.4    Servière, C.5    Lacoume, J.L.6
  • 5
    • 27244456338 scopus 로고    scopus 로고
    • Ways to enhance power analysis
    • P. Lee and C. Lim (Eds.), Berlin: Springer, Lecture Notes in Computer Science
    • Bévan R., Knudsen E.: Ways to enhance power analysis. In: Lee, P., Lim, C. (eds) Information Security and Cryptology-ICISC 2002. Lecture Notes in Computer Science, vol. 2587, pp. 327-342. Springer, Berlin (2002).
    • (2002) Information Security and Cryptology-ICISC 2002 , vol.2587 , pp. 327-342
    • Bévan, R.1    Knudsen, E.2
  • 7
    • 27244432445 scopus 로고    scopus 로고
    • A stochastic model for differential side channel cryptanalysis
    • J. Rao and B. Sunar (Eds.), Berlin: Springer, Lecture Notes in Computer Science
    • Schindler W., Lemke K., Paar C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J., Sunar, B. (eds) Cryptographic hardware and embedded systems-CHES 2005. Lecture Notes in Computer Science, vol 3659., Springer, Berlin (2005).
    • (2005) Cryptographic Hardware and Embedded Systems-CHES 2005 , vol.3659
    • Schindler, W.1    Lemke, K.2    Paar, C.3
  • 11
    • 35248830819 scopus 로고    scopus 로고
    • Multiplicative masking and power analysis of AES
    • B. KaliskiJr, Ç. Koç, and C. Paar (Eds.), Berlin: Springer, Lecture Notes in Computer Science
    • Golić J., Tymen C.: Multiplicative masking and power analysis of AES. In: Kaliski, B., Koç, Ç., Paar, C. (eds) Cryptographic Hardware and Embedded Systems-CHES 2002. Lecture Notes in Computer Science, vol. 2523, pp. 198-212. Springer, Berlin (2002).
    • (2002) Cryptographic Hardware and Embedded Systems-CHES 2002 , vol.2523 , pp. 198-212
    • Golić, J.1    Tymen, C.2
  • 12
    • 67049146380 scopus 로고    scopus 로고
    • Partition vs. comparison side-channel distinguishers: an empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected CMOS devices
    • P. J. Lee and J. H. Cheon (Eds.), Berlin: Springer, Lecture Notes in Computer Science
    • Standaert F. X., Gierlichs B., Verbauwhede I.: Partition vs. comparison side-channel distinguishers: an empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected CMOS devices. In: Lee, P. J., Cheon, J. H. (eds) Information Security and Cryptology-ICISC 2008 Lecture Notes in Computer Science, vol 5461., pp. 253-267. Springer, Berlin (2008).
    • (2008) Information Security and Cryptology-ICISC 2008 , vol.5461 , pp. 253-267
    • Standaert, F.X.1    Gierlichs, B.2    Verbauwhede, I.3
  • 13
    • 66049085129 scopus 로고    scopus 로고
    • Statistical analysis of second order differential power analysis
    • Prouff E., Rivain M., Bévan R.: Statistical analysis of second order differential power analysis. IEEE Trans. Comput. 58(6), 799-811 (2009).
    • (2009) IEEE Trans. Comput. , vol.58 , Issue.6 , pp. 799-811
    • Prouff, E.1    Rivain, M.2    Bévan, R.3
  • 17
    • 62949217527 scopus 로고    scopus 로고
    • Efficient on-chip crosstalk avoidance CODEC design
    • Duan C., Calle V. H. C., Khatri S. P.: Efficient on-chip crosstalk avoidance CODEC design. IEEE Trans. VLSI Syst. 17(4), 551-560 (2009).
    • (2009) IEEE Trans. VLSI Syst. , vol.17 , Issue.4 , pp. 551-560
    • Duan, C.1    Calle, V.H.C.2    Khatri, S.P.3
  • 18
    • 0038148273 scopus 로고    scopus 로고
    • Analysis of dissipation energy of switching digital CMOS gates with coupled outputs
    • Moll F., Roca M., Isern E.: Analysis of dissipation energy of switching digital CMOS gates with coupled outputs. Microelectr. J. 34(9), 833-842 (2003).
    • (2003) Microelectr. J. , vol.34 , Issue.9 , pp. 833-842
    • Moll, F.1    Roca, M.2    Isern, E.3
  • 19
    • 35248896294 scopus 로고    scopus 로고
    • Multi-channel attacks
    • C. Walter, Ç. Koç, and C. Paar (Eds.), Berlin: Springer, Lecture Notes in Computer Science
    • Agrawal D., Rao J., Rohatgi P.: Multi-channel attacks. In: Walter, C., Koç, Ç., Paar, C. (eds) Cryptographic Hardware and Embedded Systems-CHES 2003. Lecture Notes in Computer Science, vol 2779, pp. 2-16. Springer, Berlin (2003).
    • (2003) Cryptographic Hardware and Embedded Systems-CHES 2003 , vol.2779 , pp. 2-16
    • Agrawal, D.1    Rao, J.2    Rohatgi, P.3
  • 21
    • 35048819488 scopus 로고    scopus 로고
    • Hardware countermeasures against DPA-a statistical analysis of their effectiveness
    • T. Okamoto (Ed.), Berlin: Springer, Lecture Notes in Computer Science
    • Mangard S.: Hardware countermeasures against DPA-a statistical analysis of their effectiveness. In: Okamoto, T. (eds) Topics in Cryptology-CT-RSA 2004. Lecture Notes in Computer Science, vol. 2964, pp. 222-235. Springer, Berlin (2004).
    • (2004) Topics in Cryptology-CT-RSA 2004 , vol.2964 , pp. 222-235
    • Mangard, S.1
  • 23
    • 84887213500 scopus 로고    scopus 로고
    • Cryptographic Hardware and Embedded Systems-CHES 2008
    • In: Oswald, E., Rohatgi, P. (eds.), Washington, DC, USA, August 10-13, 2008. Lecture Notes in Computer Science. Springer, Berlin
    • Oswald, E., Rohatgi, P. (eds.) Cryptographic Hardware and Embedded Systems-CHES 2008. In: Oswald, E., Rohatgi, P. (eds.) Proceedings of 10th International Workshop, Washington, DC, USA, August 10-13, 2008. Lecture Notes in Computer Science, vol. 5154. Springer, Berlin (2008).
    • (2008) Proceedings of 10th International Workshop , vol.5154
    • Oswald, E.1    Rohatgi, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.