2012 IEEE International Carnahan Conference on Security Technology (ICCST) 2012
DOI: 10.1109/ccst.2012.6393559
|View full text |Cite
|
Sign up to set email alerts
|

CPA performance comparison based on Wavelet Transform

Abstract: Correlation Power Analysis (CPA) is a very effective attack method for finding secret keys using the statistical features of power consumption signals from cryptosystems. However, the power consumption signal of the encryption device is greatly affected or distorted by noise arising from peripheral devices. When a side channel attack is carried out, this distorted signal, which is affected by noise and time inconsistency, is the major factor that reduces the attack performance. A signal processing method based… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…In this context, it is interesting to consider wavelet (and other) signal decomposition methods. The discrete wavelet transform (DWT) [15,18] is the sum over the duration of both scaled and shifted versions of the wavelet function. In particular, it has several metaparameters for decomposition such as the number of scaled versions and shifts, and the basis functions.…”
Section: Multi Trace-frequency Domain Optimization Criterionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this context, it is interesting to consider wavelet (and other) signal decomposition methods. The discrete wavelet transform (DWT) [15,18] is the sum over the duration of both scaled and shifted versions of the wavelet function. In particular, it has several metaparameters for decomposition such as the number of scaled versions and shifts, and the basis functions.…”
Section: Multi Trace-frequency Domain Optimization Criterionmentioning
confidence: 99%
“…For the two, the SCA literature tends to suggest heuristic optimization techniques to pre-process the traces and reduce the noise or filter the raw traces. There are many meta-parameters including the bandwidth and frequency ranges of a filter, its shape, and the domain it is manipulating [12][13][14][15][16][17] (e.g., time, frequency or other domains, such as the wavelet domain [15,18]). Filters are utilized extensively in the field and in particular in the side-channel related literature.…”
Section: Introductionmentioning
confidence: 99%
“…Wavelet analysis is a powerful tool for signal processing, which is often used to approximate the target function [29]. Although wavelet analysis has been used to process noisy power traces [30][31][32], the combined effects of wavelet analysis and power analysis attacks through kernel functions have been not yet explored. In order to enhance the sparsity of wavelet approximation and the generalization of SVM, Zhang et al [33] first proposed a variant SVM algorithm based on wavelet kernel, known as wavelet SVM.…”
Section: Introductionmentioning
confidence: 99%