Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
From MaRDI portal
Publication:1698615
DOI10.1007/978-3-319-69453-5_4zbMATH Open1412.94208OpenAlexW2575587164WikidataQ58764934 ScholiaQ58764934MaRDI QIDQ1698615FDOQ1698615
Authors: Tobias M. Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu
Publication date: 16 February 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-69453-5_4
Recommendations
Cites Work
- Title not available (Why is that?)
- Statistical Analysis of Second Order Differential Power Analysis
- PRESENT: An Ultra-Lightweight Block Cipher
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Leakage-resilient symmetric cryptography under empirically verifiable assumptions
- Title not available (Why is that?)
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Mutual information analysis: a comprehensive study
- Secure hardware implementation of nonlinear functions in the presence of glitches
- The world is not enough: another look on second-order DPA
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- Towards sound approaches to counteract power-analysis attacks
- An Efficient Method for Random Delay Generation in Embedded Software
- Provably secure higher-order masking of AES
- Gaussian Mixture Models for Higher-Order Side Channel Analysis
- Topics in Cryptology – CT-RSA 2005
- Side-channel resistant crypto for less than 2,300 GE
- The Myth of Generic DPA…and the Magic of Learning
- How to certify the leakage of a chip?
- Pushing the limits: a very compact and a threshold implementation of AES
- Consolidating masking schemes
- Statistical tools flavor side-channel collision attacks
- A formal study of power variability issues and side-channel attacks for nanoscale devices
- Shuffling against side-channel attacks: a comprehensive study with cautionary note
- A more efficient AES threshold implementation
- Unifying leakage models: from probing attacks to noisy leakage.
- Making Masking Security Proofs Concrete
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
- From improved leakage detection to the detection of points of interests in leakage traces
- Conversion of security proofs from one leakage model to another: a new issue
- A New Second-Order Side Channel Attack Based on Linear Regression
Cited In (6)
- Leakage Prototype Learning for Profiled Differential Side-Channel Cryptanalysis
- Gaussian Mixture Models for Higher-Order Side Channel Analysis
- Leakage certification revisited: bounding model errors in side-channel security evaluations
- Vectorizing higher-order masking
- When Similarities Among Devices are Taken for Granted: Another Look at Portability
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
This page was built for publication: Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1698615)