A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
From MaRDI portal
Publication:3627450
DOI10.1007/978-3-642-01001-9_26zbMath1239.94066OpenAlexW1752847028WikidataQ58765221 ScholiaQ58765221MaRDI QIDQ3627450
Tal Malkin, François-Xavier Standaert, Mordechai M. Yung
Publication date: 12 May 2009
Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_26
Related Items (72)
Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \) ⋮ How to fool a black box machine learning based side-channel security evaluation ⋮ A First-Order Leak-Free Masking Countermeasure ⋮ A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models ⋮ Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis ⋮ On the influence of optimizers in deep learning-based side-channel analysis ⋮ Signature schemes secure against hard-to-invert leakage ⋮ Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces ⋮ An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks ⋮ Impossibility of Black-Box Simulation Against Leakage Attacks ⋮ Learning when to stop: a mutual information approach to prevent overfitting in profiled side-channel analysis ⋮ Protecting secure ICs against side-channel attacks by identifying and quantifying potential EM and leakage hotspots at simulation stage ⋮ Security analysis of deterministic re-keying with masking and shuffling: application to ISAP ⋮ Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data ⋮ Reinforcement learning-based design of side-channel countermeasures ⋮ A novel completeness test for leakage models and its application to side channel attacks and responsibly engineered simulators ⋮ AES side-channel countermeasure using random tower field constructions ⋮ Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis ⋮ Complementing Feistel Ciphers ⋮ Higher-Order Side Channel Security and Mask Refreshing ⋮ Horizontal collision correlation attack on elliptic curves ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ Focus is key to success: a focal loss function for deep learning-based side-channel analysis ⋮ On the evaluation of deep learning-based side-channel analysis ⋮ Systematic study of decryption and re-encryption leakage: the case of Kyber ⋮ Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations ⋮ Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations ⋮ On the exact relationship between the mutual information metric and the success rate metric ⋮ Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model ⋮ Physical attacks and beyond ⋮ Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks ⋮ Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms ⋮ Learning with physical rounding for linear and quadratic leakage functions ⋮ Trojan-resilience without cryptography ⋮ A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks ⋮ Unifying leakage models: from probing attacks to noisy leakage ⋮ Mutual information analysis: a comprehensive study ⋮ Sliding-window correlation attacks against encryption devices with an unstable clock ⋮ Assessing the feasibility of single trace power analysis of Frodo ⋮ Profiled power analysis attacks using convolutional neural networks with domain knowledge ⋮ Vectorizing Higher-Order Masking ⋮ On the Use of Independent Component Analysis to Denoise Side-Channel Measurements ⋮ There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks ⋮ Маскирование ГОСТ 28147-89 для защиты от атак по побочным каналам ⋮ Categorising and comparing cluster-based DPA distinguishers ⋮ On the optimality and practicability of mutual information analysis in some scenarios ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ Asymptotic information leakage under one-try attacks ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ A Note on the Use of Margins to Compare Distinguishers ⋮ A Theoretical Study of Kolmogorov-Smirnov Distinguishers ⋮ ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research ⋮ On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Optimal Amplification of Noisy Leakages ⋮ A formal analysis of prefetching in profiled cache-timing attacks on block ciphers ⋮ Near Collision Side Channel Attacks ⋮ Fast and Memory-Efficient Key Recovery in Side-Channel Attacks ⋮ A Leakage-Resilient Mode of Operation ⋮ Improving DPA by Peak Distribution Analysis ⋮ Affine Masking against Higher-Order Side Channel Analysis ⋮ Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications ⋮ Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice ⋮ PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology ⋮ Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks ⋮ Leakage-Resilient Signatures ⋮ A template attack to reconstruct the input of SHA-3 on an 8-bit device ⋮ \textsf{Scatter}: a missing case? ⋮ On the implementation efficiency of linear regression-based side-channel attacks ⋮ Kilroy was here: the first step towards explainability of neural networks in profiled side-channel analysis ⋮ Online performance evaluation of deep learning networks for profiled side-channel analysis
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A Mathematical Theory of Communication
- Private Circuits II: Keeping Secrets in Tamperable Circuits
- A Leakage-Resilient Mode of Operation
- Communication Theory of Secrecy Systems*
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology - CRYPTO 2003
- Theory of Cryptography
- Theory of Cryptography
This page was built for publication: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks