Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
From MaRDI portal
Publication:1698615
DOI10.1007/978-3-319-69453-5_4zbMath1412.94208OpenAlexW2575587164WikidataQ58764934 ScholiaQ58764934MaRDI QIDQ1698615
Tobias Schneider, François-Xavier Standaert, Tim Güneysu, Amir Moradi
Publication date: 16 February 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-69453-5_4
Related Items (3)
When Similarities Among Devices are Taken for Granted: Another Look at Portability ⋮ Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms ⋮ Vectorizing Higher-Order Masking
Cites Work
- Unnamed Item
- Unnamed Item
- Mutual information analysis: a comprehensive study
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Side-channel resistant crypto for less than 2,300 GE
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
- From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
- Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
- Statistical Tools Flavor Side-Channel Collision Attacks
- Making Masking Security Proofs Concrete
- Pushing the Limits: A Very Compact and a Threshold Implementation of AES
- A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices
- The World Is Not Enough: Another Look on Second-Order DPA
- Consolidating Masking Schemes
- Gaussian Mixture Models for Higher-Order Side Channel Analysis
- PRESENT: An Ultra-Lightweight Block Cipher
- Provably Secure Higher-Order Masking of AES
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- An Efficient Method for Random Delay Generation in Embedded Software
- Conversion of Security Proofs from One Leakage Model to Another: A New Issue
- Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
- Towards sound approaches to counteract power-analysis attacks
- Statistical Analysis of Second Order Differential Power Analysis
- A More Efficient AES Threshold Implementation
- A New Second-Order Side Channel Attack Based on Linear Regression
- Cryptographic Hardware and Embedded Systems - CHES 2004
- The Myth of Generic DPA…and the Magic of Learning
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- How to Certify the Leakage of a Chip?
- Topics in Cryptology – CT-RSA 2005
This page was built for publication: Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms