A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks

From MaRDI portal
Publication:3627450


DOI10.1007/978-3-642-01001-9_26zbMath1239.94066WikidataQ58765221 ScholiaQ58765221MaRDI QIDQ3627450

Tal Malkin, François-Xavier Standaert, Mordechai M. Yung

Publication date: 12 May 2009

Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_26


94A60: Cryptography


Related Items

There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks, Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications, Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis, Маскирование ГОСТ 28147-89 для защиты от атак по побочным каналам, Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, Asymptotic information leakage under one-try attacks, Signature schemes secure against hard-to-invert leakage, AES side-channel countermeasure using random tower field constructions, Mutual information analysis: a comprehensive study, On the optimality and practicability of mutual information analysis in some scenarios, On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives, Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model, On the influence of optimizers in deep learning-based side-channel analysis, Horizontal collision correlation attack on elliptic curves, Masking and leakage-resilient primitives: one, the other(s) or both?, Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data, Physical attacks and beyond, Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks, Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms, Unifying leakage models: from probing attacks to noisy leakage, Sliding-window correlation attacks against encryption devices with an unstable clock, Assessing the feasibility of single trace power analysis of Frodo, Profiled power analysis attacks using convolutional neural networks with domain knowledge, Categorising and comparing cluster-based DPA distinguishers, Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version, A formal analysis of prefetching in profiled cache-timing attacks on block ciphers, A template attack to reconstruct the input of SHA-3 on an 8-bit device, \textsf{Scatter}: a missing case?, On the implementation efficiency of linear regression-based side-channel attacks, Kilroy was here: the first step towards explainability of neural networks in profiled side-channel analysis, Online performance evaluation of deep learning networks for profiled side-channel analysis, Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \), How to fool a black box machine learning based side-channel security evaluation, Learning when to stop: a mutual information approach to prevent overfitting in profiled side-channel analysis, Protecting secure ICs against side-channel attacks by identifying and quantifying potential EM and leakage hotspots at simulation stage, Security analysis of deterministic re-keying with masking and shuffling: application to ISAP, Reinforcement learning-based design of side-channel countermeasures, A novel completeness test for leakage models and its application to side channel attacks and responsibly engineered simulators, On the exact relationship between the mutual information metric and the success rate metric, Trojan-resilience without cryptography, A Note on the Use of Margins to Compare Distinguishers, A Theoretical Study of Kolmogorov-Smirnov Distinguishers, ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research, Optimal Amplification of Noisy Leakages, Near Collision Side Channel Attacks, Fast and Memory-Efficient Key Recovery in Side-Channel Attacks, Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice, A First-Order Leak-Free Masking Countermeasure, A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models, Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis, Complementing Feistel Ciphers, Higher-Order Side Channel Security and Mask Refreshing, Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations, Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations, A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks, Improving DPA by Peak Distribution Analysis, Affine Masking against Higher-Order Side Channel Analysis, PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology, Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks, Vectorizing Higher-Order Masking, On the Use of Independent Component Analysis to Denoise Side-Channel Measurements, Leakage-Resilient Signatures, Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces, An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks, Impossibility of Black-Box Simulation Against Leakage Attacks, A Leakage-Resilient Mode of Operation



Cites Work