Power Analysis Attacks
From MaRDI portal
Publication:5201284
DOI10.1007/978-0-387-38162-6zbMATH Open1131.68449OpenAlexW4240560709MaRDI QIDQ5201284FDOQ5201284
Authors: Stefan Mangard, Elisabeth Oswald, Thomas Popp
Publication date: 13 April 2006
Full work available at URL: https://doi.org/10.1007/978-0-387-38162-6
Recommendations
Data encryption (aspects in computer science) (68P25) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to computer science (68-01)
Cited In (only showing first 100 items - show all)
- Threshold implementations of small S-boxes
- Novel true random number generator based hardware cryptographic architecture using quantum-dot cellular automata
- Profiled power analysis attacks using convolutional neural networks with domain knowledge
- Improving differential power analysis by elastic alignment
- \textsf{Scatter}: a missing case?
- Getting more from PCA: First results of using principal component analysis for extensive power analysis
- Correlation power analysis and higher-order masking implementation of WAGE
- On the influence of optimizers in deep learning-based side-channel analysis
- Transparency order for Boolean functions: analysis and construction
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
- Faster Addition and Doubling on Elliptic Curves
- Differential power analysis of the Picnic signature scheme
- Categorising and comparing cluster-based DPA distinguishers
- Acoustic cryptanalysis
- Improving DPA by peak distribution analysis
- Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \)
- Quantum key search with side channel advice
- Title not available (Why is that?)
- Applied Cryptography and Network Security
- First-order side channel attacks on Zhang's countermeasures
- Masking tables -- an underestimated security risk
- Title not available (Why is that?)
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives
- On Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel Analysis
- DEFAULT: cipher level resistance against differential fault attack
- Combined attack on CRT-RSA. Why public verification must not be public?
- Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
- On using RSA/ECC coprocessor for ideal lattice-based key exchange
- The distributions of individual bits in the output of multiplicative operations
- Buying AES design resistance with speed and energy
- Affine Masking against Higher-Order Side Channel Analysis
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software
- On efficient leakage-resilient pseudorandom functions with hard-to-invert leakages
- An Analysis of Goubin’s Refined Power Analysis Attack
- PKDPA: An enhanced probabilistic differential power attack methodology
- Design methodology and validity verification for a reactive countermeasure against EM attacks
- Spectral approach for correlation power analysis
- Side-channel cryptographic attacks using pseudo-Boolean optimization
- Exponent Recoding and Regular Exponentiation Algorithms
- On the evaluation of deep learning-based side-channel analysis
- Side-channel resistant crypto for less than 2,300 GE
- There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks
- Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience
- Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks
- Sliding-window correlation attacks against encryption devices with an unstable clock
- Spin me right round rotational symmetry for FPGA-specific AES: extended version
- Complementing Feistel ciphers
- Localized electromagnetic analysis of cryptographic implementations
- Enabling 3-share threshold implementations for all 4-bit S-boxes
- Higher-order masking in practice: a vector implementation of masked AES for ARM NEON
- Exploiting collisions in addition chain-based exponentiation algorithms using a single trace
- On the security of RSM -- presenting 5 first -- and second-order attacks
- On the exact relationship between the mutual information metric and the success rate metric
- Mutual information analysis: a comprehensive study
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Memory-constrained implementations of elliptic curve cryptography in co-\(Z\) coordinate repre\-sentation
- Hadamard matrices, \(d\)-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weights
- Chipwhisperer: an open-source platform for hardware embedded security research
- A theoretical study of Kolmogorov-Smirnov distinguishers
- Side-channeling the \textsf{Kalyna} key expansion
- Unifying leakage models: from probing attacks to noisy leakage
- Two improved multiple-differential collision attacks
- Cryptanalysis of a Chaotic Block Cryptographic System Against Template Attacks
- Random Order m-ary Exponentiation
- Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model
- Remote IP protection using timing channels
- Attacks and security proofs of EAX-prime
- Differential power analysis of a McEliece cryptosystem
- On the use of RSA public exponent to improve implementation efficiency and side-channel resistance
- Practical Attacks on Masked Hardware
- Taylor expansion of maximum likelihood attacks for masked and shuffled implementations
- On the Use of Independent Component Analysis to Denoise Side-Channel Measurements
- Protecting Triple-DES Against DPA
- Threshold Implementation in Software
- Affine equivalence and its application to tightening threshold implementations
- Near collision side channel attacks
- Hiding higher-order side-channel leakage. Randomizing cryptographic implementations in reconfigurable hardware
- Multivariate leakage model for improving non-profiling DPA on noisy power traces
- Arithmetic Addition over Boolean Masking
- Improved power analysis attacks on Falcon
- On the feasibility of single-trace attacks on the Gaussian sampler using a CDT
- A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial
- Learning with physical rounding for linear and quadratic leakage functions
- Focus is key to success: a focal loss function for deep learning-based side-channel analysis
- Score-Based vs. Probability-Based Enumeration – A Cautionary Note
- Stronger lower bounds for leakage-resilient secret sharing
- From substitution box to threshold
- Protecting ring oscillator physical unclonable functions against modeling attacks
- Photonic power firewalls
- Multivariate analysis exploiting static power on nanoscale CMOS circuits for cryptographic applications
- Combining loop shuffling and code polymorphism for enhanced AES side-channel security
- EFFLUX-F2: a high performance hardware security evaluation board
- Towards private deep learning-based side-channel analysis using homomorphic encryption. Opportunities and limitations
- Towards sound fresh re-keying with hard (physical) learning problems
- Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori
Uses Software
This page was built for publication: Power Analysis Attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5201284)