A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks

From MaRDI portal
Revision as of 06:07, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3627450

DOI10.1007/978-3-642-01001-9_26zbMath1239.94066OpenAlexW1752847028WikidataQ58765221 ScholiaQ58765221MaRDI QIDQ3627450

Tal Malkin, François-Xavier Standaert, Mordechai M. Yung

Publication date: 12 May 2009

Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_26




Related Items (72)

Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \)How to fool a black box machine learning based side-channel security evaluationA First-Order Leak-Free Masking CountermeasureA New Difference Method for Side-Channel Analysis with High-Dimensional Leakage ModelsGetting More from PCA: First Results of Using Principal Component Analysis for Extensive Power AnalysisOn the influence of optimizers in deep learning-based side-channel analysisSignature schemes secure against hard-to-invert leakageMultivariate Leakage Model for Improving Non-profiling DPA on Noisy Power TracesAn Optimal Key Enumeration Algorithm and Its Application to Side-Channel AttacksImpossibility of Black-Box Simulation Against Leakage AttacksLearning when to stop: a mutual information approach to prevent overfitting in profiled side-channel analysisProtecting secure ICs against side-channel attacks by identifying and quantifying potential EM and leakage hotspots at simulation stageSecurity analysis of deterministic re-keying with masking and shuffling: application to ISAPHomomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more dataReinforcement learning-based design of side-channel countermeasuresA novel completeness test for leakage models and its application to side channel attacks and responsibly engineered simulatorsAES side-channel countermeasure using random tower field constructionsCryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power AnalysisComplementing Feistel CiphersHigher-Order Side Channel Security and Mask RefreshingHorizontal collision correlation attack on elliptic curvesMasking and leakage-resilient primitives: one, the other(s) or both?Effective and efficient masking with low noise using small-Mersenne-prime ciphersFocus is key to success: a focal loss function for deep learning-based side-channel analysisOn the evaluation of deep learning-based side-channel analysisSystematic study of decryption and re-encryption leakage: the case of KyberCharacterisation and Estimation of the Key Rank Distribution in the Context of Side Channel EvaluationsTaylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled ImplementationsOn the exact relationship between the mutual information metric and the success rate metricProuff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage modelPhysical attacks and beyondDetecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacksBridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histogramsLearning with physical rounding for linear and quadratic leakage functionsTrojan-resilience without cryptographyA Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel AttacksUnifying leakage models: from probing attacks to noisy leakageMutual information analysis: a comprehensive studySliding-window correlation attacks against encryption devices with an unstable clockAssessing the feasibility of single trace power analysis of FrodoProfiled power analysis attacks using convolutional neural networks with domain knowledgeVectorizing Higher-Order MaskingOn the Use of Independent Component Analysis to Denoise Side-Channel MeasurementsThere Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel AttacksМаскирование ГОСТ 28147-89 для защиты от атак по побочным каналамCategorising and comparing cluster-based DPA distinguishersOn the optimality and practicability of mutual information analysis in some scenariosParallel Implementations of Masking Schemes and the Bounded Moment Leakage ModelAsymptotic information leakage under one-try attacksMaking masking security proofs concrete (or how to evaluate the security of any leaking device), extended versionA Note on the Use of Margins to Compare DistinguishersA Theoretical Study of Kolmogorov-Smirnov DistinguishersChipWhisperer: An Open-Source Platform for Hardware Embedded Security ResearchOn hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitivesFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelOptimal Amplification of Noisy LeakagesA formal analysis of prefetching in profiled cache-timing attacks on block ciphersNear Collision Side Channel AttacksFast and Memory-Efficient Key Recovery in Side-Channel AttacksA Leakage-Resilient Mode of OperationImproving DPA by Peak Distribution AnalysisAffine Masking against Higher-Order Side Channel AnalysisMultivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic ApplicationsCorrelation Power Analysis of Lightweight Block Ciphers: From Theory to PracticePKDPA: An Enhanced Probabilistic Differential Power Attack MethodologyFormal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel AttacksLeakage-Resilient SignaturesA template attack to reconstruct the input of SHA-3 on an 8-bit device\textsf{Scatter}: a missing case?On the implementation efficiency of linear regression-based side-channel attacksKilroy was here: the first step towards explainability of neural networks in profiled side-channel analysisOnline performance evaluation of deep learning networks for profiled side-channel analysis



Cites Work


This page was built for publication: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks