Mutual information analysis: a comprehensive study
DOI10.1007/S00145-010-9084-8zbMATH Open1239.94032DBLPjournals/joc/BatinaGPRSV11OpenAlexW2145267250WikidataQ58765152 ScholiaQ58765152MaRDI QIDQ656515FDOQ656515
Authors: Lejla Batina, Benedikt Gierlichs, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert, Nicolas Veyrat-Charvillon
Publication date: 18 January 2012
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-1321.pdf
Recommendations
- Analysis of nonparametric estimation methods for mutual information analysis
- On the optimality and practicability of mutual information analysis in some scenarios
- Mutual information as a measure of multivariate association: analytical properties and statistical estimation
- A comprehensive evaluation of mutual information analysis using a fair evaluation framework
- Mutual Information Analysis: How, When and Why?
- Some data analyses using mutual information
side-channel analysisprobability density estimationhigher-order attacksmasking countermeasuremutual information analysis
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- On optimal data-based bandwidth selection in kernel density estimation
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Statistical Analysis of Second Order Differential Power Analysis
- On the histogram as a density estimator:L 2 theory
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Title not available (Why is that?)
- Title not available (Why is that?)
- On optimal and data-based histograms
- Title not available (Why is that?)
- Cryptographic Hardware and Embedded Systems - CHES 2004
- The world is not enough: another look on second-order DPA
- Title not available (Why is that?)
- Information Theoretical Analysis of Multivariate Correlation
- Title not available (Why is that?)
- Power Analysis Attacks
- Mutual Information Analysis: How, When and Why?
- Towards sound approaches to counteract power-analysis attacks
- Gaussian Mixture Models for Higher-Order Side Channel Analysis
- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
- Differential Cluster Analysis
- Title not available (Why is that?)
- Revisiting Higher-Order DPA Attacks:
Cited In (25)
- Threshold implementations of small S-boxes
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Mutual Information Analysis: How, When and Why?
- \textsf{Scatter}: a missing case?
- Integrating side channel security in the FPGA hardware design flow
- PAC privacy: automatic privacy measurement and control of data processing
- Analysis of nonparametric estimation methods for mutual information analysis
- A comprehensive evaluation of mutual information analysis using a fair evaluation framework
- First principal components analysis: a new side channel distinguisher
- On adaptive bandwidth selection for efficient MIA
- Taylor expansion of maximum likelihood attacks for masked and shuffled implementations
- Statistical properties of side-channel and fault injection attacks using coding theory
- Multivariate leakage model for improving non-profiling DPA on noisy power traces
- Theoretical and practical aspects of mutual information-based side channel analysis
- Measuring the asymmetric contributions of individual subsystems
- Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks
- Revisiting mutual information analysis: multidimensionality, neural estimation and optimality proofs
- Horizontal collision correlation attack on elliptic curves
- Leakage certification made simple
- Fuzzy matching template attacks on multivariate cryptography: a case study
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
- Some data analyses using mutual information
- On the exact relationship between the mutual information metric and the success rate metric
- On the optimality and practicability of mutual information analysis in some scenarios
- Not optimal but efficient: a distinguisher based on the Kruskal-Wallis test
This page was built for publication: Mutual information analysis: a comprehensive study
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q656515)