2013
DOI: 10.1109/tc.2012.112
|View full text |Cite
|
Sign up to set email alerts
|

A New Second-Order Side Channel Attack Based on Linear Regression

Abstract: Abstract-Embedded implementations of cryptographic primitives need protection against Side Channel Analysis. Stochastic attacks, introduced by Schindler et al. at CHES 2005, are an example of such an analysis. They offer a pertinent alternative to template attacks which efficiency is optimal, and they can theoretically defeat any kind of countermeasure including masking. In both template and stochastic attacks, the adversary needs to be able to carry out a profiling stage on a perfect copy of the target device… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 30 publications
(33 citation statements)
references
References 28 publications
0
30
0
Order By: Relevance
“…They also argued that the LRA can be applied in the same context as the CPA, but with weaker assumption on the device behavior. Subsequently, these results of Doget et al have been extended in [10] to apply against masked implementations. In parallel, linear regression attacks have been used to analyse/model the deterministic part of the information leakage for complex circuits [14,15].…”
Section: Practical Evaluation Of Linear Regression Attacksmentioning
confidence: 99%
See 3 more Smart Citations
“…They also argued that the LRA can be applied in the same context as the CPA, but with weaker assumption on the device behavior. Subsequently, these results of Doget et al have been extended in [10] to apply against masked implementations. In parallel, linear regression attacks have been used to analyse/model the deterministic part of the information leakage for complex circuits [14,15].…”
Section: Practical Evaluation Of Linear Regression Attacksmentioning
confidence: 99%
“…the DPA [17] or the multi-bit DPA [23]) were actually originally written as such, whereas the other ones were developed in a partitioning way after their introduction (see e.g. [18] for the CPA, [10] for the LRA and [33] for the MIA). To the best of our knowledge, this property has however never been exploited to improve the attacks efficiency.…”
Section: Algorithmic Complexity Improvements Proposalsmentioning
confidence: 99%
See 2 more Smart Citations
“…If the two leaking operations are similar, e.g., two computations of S-box, then the attack is referred to as a collision attack [6]. Otherwise, the attack is generally termed bivariate, and can consist in second-order CPA [28], multivariate MIA [18], or any other variant (e.g., [15]). For this reason, every intermediate variable is masked independently (e.g., the same masked S-box cannot be used twice), and the sharing is done with strictly more than two shares.…”
Section: Multi-mask Fems Vs Mono-mask Lemsmentioning
confidence: 99%