Mutual information analysis: a comprehensive study
From MaRDI portal
Publication:656515
DOI10.1007/s00145-010-9084-8zbMath1239.94032WikidataQ58765152 ScholiaQ58765152MaRDI QIDQ656515
Emmanuel Prouff, Matthieu Rivain, Nicolas Veyrat-Charvillon, Lejla Batina, Benedikt Gierlichs, François-Xavier Standaert
Publication date: 18 January 2012
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-1321.pdf
probability density estimation; side-channel analysis; higher-order attacks; masking countermeasure; mutual information analysis
94A60: Cryptography
Related Items
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, Revisiting mutual information analysis: multidimensionality, neural estimation and optimality proofs, PAC privacy: automatic privacy measurement and control of data processing, Fuzzy matching template attacks on multivariate cryptography: a case study, Threshold implementations of small S-boxes, Horizontal collision correlation attack on elliptic curves, Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms, Statistical properties of side-channel and fault injection attacks using coding theory, \textsf{Scatter}: a missing case?, Integrating side channel security in the FPGA hardware design flow, On the exact relationship between the mutual information metric and the success rate metric, Measuring the asymmetric contributions of individual subsystems, Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations, Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks, Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces
Cites Work
- The World Is Not Enough: Another Look on Second-Order DPA
- On optimal and data-based histograms
- Information Theoretical Analysis of Multivariate Correlation
- On optimal data-based bandwidth selection in kernel density estimation
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Gaussian Mixture Models for Higher-Order Side Channel Analysis
- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Differential Cluster Analysis
- Mutual Information Analysis: How, When and Why?
- On the histogram as a density estimator:L 2 theory
- Statistical Analysis of Second Order Differential Power Analysis
- Revisiting Higher-Order DPA Attacks:
- Power Analysis Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item