2009
DOI: 10.1109/tc.2009.15
|View full text |Cite
|
Sign up to set email alerts
|

Statistical Analysis of Second Order Differential Power Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

4
224
3

Year Published

2010
2010
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 257 publications
(265 citation statements)
references
References 12 publications
4
224
3
Order By: Relevance
“…Two of them are commonly used: the product combining [1] which consists in multiplying the two signals and the absolute difference combining [18] which computes the absolute value of the difference between two signals. [21] confirmed the hint of [1] that centering the leakages before combining them by product yields a better combining function in the context of a second-order DPA with leakages closely following a Hamming weight model. The resulting normalized product combining is defined as:…”
Section: Second-order Differential Power Analysissupporting
confidence: 52%
“…Two of them are commonly used: the product combining [1] which consists in multiplying the two signals and the absolute difference combining [18] which computes the absolute value of the difference between two signals. [21] confirmed the hint of [1] that centering the leakages before combining them by product yields a better combining function in the context of a second-order DPA with leakages closely following a Hamming weight model. The resulting normalized product combining is defined as:…”
Section: Second-order Differential Power Analysissupporting
confidence: 52%
“…For each of them, we estimated the minimum number of observations N required for the attack to succeed with a probability at least equal to 0.9. As argued in [17,25], this is a sound way to evaluate the efficiency of a side-channel attack. Results are reported in Figure 3(a).…”
Section: Attack Simulationsmentioning
confidence: 99%
“…the simulated leakage. Secondly, we launched second-order attacks on a binary masked implementation of AES: the leakage sample corresponding to the mask value and the sample corresponding to the masked SubBytes operation were combined using the 'centre and multiply' method (see e.g [17]), and then a standard Hamming-weight CPA was launched. To enable a direct comparison with the standard CPA attacks, we ran the template attacks using data with an SNR of 2 −7 .…”
Section: Distinguishers and Higher-order Attacksmentioning
confidence: 99%