2005
DOI: 10.1007/11545262_22
|View full text |Cite
|
Sign up to set email alerts
|

On Second-Order Differential Power Analysis

Abstract: Abstract. Differential Power Analysis (DPA) is a powerful cryptanalytic technique aiming at extracting secret data from a cryptographic device by collecting power consumption traces and averaging over a series of acquisitions. In order to prevent the leakage, hardware designers and software programmers make use of masking techniques (a.k.a. data whitening methods). However, the resulting implementations may still succumb to second-order DPA. Several recent papers studied secondorder DPA but, although the concl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
55
0

Year Published

2006
2006
2016
2016

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 96 publications
(55 citation statements)
references
References 12 publications
0
55
0
Order By: Relevance
“…We assume a side-channel attack model similar to [20], generalized to all kinds of side-channels. Side-channel information is leaked by consuming a resource such as time and power, or by emitting an undesirable byproduct, such as radiation, noise, or heat.…”
Section: Mitigating Side-channel Attacksmentioning
confidence: 99%
“…We assume a side-channel attack model similar to [20], generalized to all kinds of side-channels. Side-channel information is leaked by consuming a resource such as time and power, or by emitting an undesirable byproduct, such as radiation, noise, or heat.…”
Section: Mitigating Side-channel Attacksmentioning
confidence: 99%
“…Two combination functions are studied most in previous literatures. The absolute difference combination function |L(t 0 ) − L(t 1 )| was first proposed by Messerges [10] and analyzed mathematically by Joye et al [11]. The centered product combination function [L(t 0 ) − E(L(t 0 ))] × [L(t 1 ) − E(L(t 1 ))] was proposed by Chari et al [12] and analyzed by Schramm and Paar [13].…”
Section: Introductionmentioning
confidence: 99%
“…Side channel attacks combining multiple points of leakage are also called higher-order attacks [56,103]. Since protected implementations can generally not be successfully attacked with a univariate attack, higher-order attacks are also a means to break countermeasures [95,111].…”
Section: Side Channel Attacksmentioning
confidence: 99%