Power Analysis Attacks
From MaRDI portal
Publication:5201284
DOI10.1007/978-0-387-38162-6zbMATH Open1131.68449OpenAlexW4240560709MaRDI QIDQ5201284FDOQ5201284
Thomas Popp, Elisabeth Oswald, Stefan Mangard
Publication date: 13 April 2006
Full work available at URL: https://doi.org/10.1007/978-0-387-38162-6
Data encryption (aspects in computer science) (68P25) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to computer science (68-01)
Cited In (only showing first 100 items - show all)
- Threshold implementations of small S-boxes
- Novel true random number generator based hardware cryptographic architecture using quantum-dot cellular automata
- Profiled power analysis attacks using convolutional neural networks with domain knowledge
- \textsf{Scatter}: a missing case?
- Correlation power analysis and higher-order masking implementation of WAGE
- On the influence of optimizers in deep learning-based side-channel analysis
- Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace
- Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON
- On the Security of RSM - Presenting 5 First- and Second-Order Attacks
- Complementing Feistel Ciphers
- Localized Electromagnetic Analysis of Cryptographic Implementations
- Transparency order for Boolean functions: analysis and construction
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
- Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes
- Faster Addition and Doubling on Elliptic Curves
- Differential power analysis of the Picnic signature scheme
- ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research
- Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation
- Masking Tables—An Underestimated Security Risk
- A Theoretical Study of Kolmogorov-Smirnov Distinguishers
- Categorising and comparing cluster-based DPA distinguishers
- Acoustic cryptanalysis
- Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \)
- Quantum key search with side channel advice
- Title not available (Why is that?)
- Applied Cryptography and Network Security
- First-order side channel attacks on Zhang's countermeasures
- Title not available (Why is that?)
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives
- On Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel Analysis
- Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis
- DEFAULT: cipher level resistance against differential fault attack
- Improving Differential Power Analysis by Elastic Alignment
- Spectral Approach for Correlation Power Analysis
- Buying AES Design Resistance with Speed and Energy
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
- On using RSA/ECC coprocessor for ideal lattice-based key exchange
- The distributions of individual bits in the output of multiplicative operations
- Affine Masking against Higher-Order Side Channel Analysis
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Improving DPA by Peak Distribution Analysis
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software
- An Analysis of Goubin’s Refined Power Analysis Attack
- Design methodology and validity verification for a reactive countermeasure against EM attacks
- Side-channel cryptographic attacks using pseudo-Boolean optimization
- Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks
- Exponent Recoding and Regular Exponentiation Algorithms
- On the evaluation of deep learning-based side-channel analysis
- Side-channel resistant crypto for less than 2,300 GE
- There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks
- Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience
- Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks
- Sliding-window correlation attacks against encryption devices with an unstable clock
- Spin me right round rotational symmetry for FPGA-specific AES: extended version
- On the exact relationship between the mutual information metric and the success rate metric
- On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages
- Mutual information analysis: a comprehensive study
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Hadamard matrices, \(d\)-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weights
- PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology
- Combined Attack on CRT-RSA
- Side-channeling the \textsf{Kalyna} key expansion
- Unifying leakage models: from probing attacks to noisy leakage
- Two improved multiple-differential collision attacks
- Cryptanalysis of a Chaotic Block Cryptographic System Against Template Attacks
- Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors
- Random Order m-ary Exponentiation
- Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model
- Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications
- Practical Attacks on Masked Hardware
- On the Use of Independent Component Analysis to Denoise Side-Channel Measurements
- Protecting Triple-DES Against DPA
- Threshold Implementation in Software
- Arithmetic Addition over Boolean Masking
- Differential Power Analysis of a McEliece Cryptosystem
- On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance
- Remote IP Protection Using Timing Channels
- Attacks and Security Proofs of EAX-Prime
- Improved power analysis attacks on Falcon
- On the feasibility of single-trace attacks on the Gaussian sampler using a CDT
- A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial
- Learning with physical rounding for linear and quadratic leakage functions
- Focus is key to success: a focal loss function for deep learning-based side-channel analysis
- Score-Based vs. Probability-Based Enumeration – A Cautionary Note
- Stronger lower bounds for leakage-resilient secret sharing
- Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations
- Affine Equivalence and Its Application to Tightening Threshold Implementations
- Near Collision Side Channel Attacks
- From substitution box to threshold
- Combining loop shuffling and code polymorphism for enhanced AES side-channel security
- EFFLUX-F2: a high performance hardware security evaluation board
- Towards private deep learning-based side-channel analysis using homomorphic encryption. Opportunities and limitations
- Hiding Higher-Order Side-Channel Leakage
- Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking
- \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption
- A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers
- When Similarities Among Devices are Taken for Granted: Another Look at Portability
Uses Software
This page was built for publication: Power Analysis Attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5201284)