2011
DOI: 10.1007/s13389-011-0010-2
|View full text |Cite
|
Sign up to set email alerts
|

Univariate side channel attacks and leakage modeling

Abstract: Differential power analysis is a powerful cryptanalytic technique that exploits information leaking from physical implementations of cryptographic algorithms. During the two last decades, numerous variations of the original principle have been published. In particular, the univariate case, where a single instantaneous leakage is exploited, has attracted much research effort. In this paper, we argue that several univariate attacks among the most frequently used by the community are not only asymptotically equiv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

3
108
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 153 publications
(111 citation statements)
references
References 15 publications
3
108
0
Order By: Relevance
“…This study was motivated by the observation that the classical LRA distinguisher value for one leakage time is not comparable as such to that computed for another leakage time. Figure 1(a) illustrates this claim for an LRA targeting the device B described in Section 2.5: when directly applying the protocol given in [11,31], the correct key candidate does not maximize the distinguisher value globally but only in a local area, which makes the attack unsuccessful unless this area is known by the adversary (which is not assumed here). This observation led us to study the handling of distinguishing values in SCA attacks.…”
Section: Effectiveness Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…This study was motivated by the observation that the classical LRA distinguisher value for one leakage time is not comparable as such to that computed for another leakage time. Figure 1(a) illustrates this claim for an LRA targeting the device B described in Section 2.5: when directly applying the protocol given in [11,31], the correct key candidate does not maximize the distinguisher value globally but only in a local area, which makes the attack unsuccessful unless this area is known by the adversary (which is not assumed here). This observation led us to study the handling of distinguishing values in SCA attacks.…”
Section: Effectiveness Discussionmentioning
confidence: 99%
“…More generally, our study relies on a well studied problem which is the comparison of the results of two different instantaneous attacks [11,20,33,34,36,38]. For the LRA, it will lead to a modification of the candidate selection rule.…”
Section: Effectiveness Discussionmentioning
confidence: 99%
See 3 more Smart Citations