2006
DOI: 10.1007/11894063_2
|View full text |Cite
|
Sign up to set email alerts
|

Templates vs. Stochastic Methods

Abstract: Abstract. Template Attacks and the Stochastic Model provide advanced methods for side channel cryptanalysis that make use of 'a-priori' knowledge gained from a profiling step. For a systematic comparison of Template Attacks and the Stochastic Model, we use two sets of measurement data that originate from two different microcontrollers and setups. Our main contribution is to capture performance aspects against crucial parameters such as the number of measurements available during profiling and classification. M… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
118
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 156 publications
(125 citation statements)
references
References 7 publications
2
118
0
Order By: Relevance
“…These are obtained by averaging over 1,000 repeat experiments on randomly drawn balanced samples (i.e. comprising an equal number of replicates per intermediate value) with Gaussian noise at high (8), medium (1) and low (0.125) signal-to-noise ratios (SNRs) 5 as model degree ranges from 1 through to 8. 6 Criterion 3 can be assessed straightforwardly by computing theoretic distinguishing vectors for correlation DPA using the asymptotically fitted model cor-4 'Power' in this context refers to statistical power and should not be confused with the 'Power' in DPA.…”
Section: Models For Inputs Vs Models For Intermediate Valuesmentioning
confidence: 99%
See 4 more Smart Citations
“…These are obtained by averaging over 1,000 repeat experiments on randomly drawn balanced samples (i.e. comprising an equal number of replicates per intermediate value) with Gaussian noise at high (8), medium (1) and low (0.125) signal-to-noise ratios (SNRs) 5 as model degree ranges from 1 through to 8. 6 Criterion 3 can be assessed straightforwardly by computing theoretic distinguishing vectors for correlation DPA using the asymptotically fitted model cor-4 'Power' in this context refers to statistical power and should not be confused with the 'Power' in DPA.…”
Section: Models For Inputs Vs Models For Intermediate Valuesmentioning
confidence: 99%
“…6 Criterion 3 can be assessed straightforwardly by computing theoretic distinguishing vectors for correlation DPA using the asymptotically fitted model cor-4 'Power' in this context refers to statistical power and should not be confused with the 'Power' in DPA. 5 We define the SNR as var(L(V )) var(ε) , where L is the data-dependent leakage function (the variance of which is computed with respect to the distribution of the intermediate value V , which is uniform throughout in our analysis) and ε is the independent noise. 6 To reduce computational complexity we take the usual strategy (see, for example, [1])…”
Section: Models For Inputs Vs Models For Intermediate Valuesmentioning
confidence: 99%
See 3 more Smart Citations