2003
DOI: 10.1007/3-540-36552-4_23
|View full text |Cite
|
Sign up to set email alerts
|

Ways to Enhance Differential Power Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
59
0

Year Published

2004
2004
2016
2016

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(64 citation statements)
references
References 8 publications
1
59
0
Order By: Relevance
“…Both approaches exhibit some limitations due to unrealistic assumptions and model imperfections that will be examined more thoroughly in this paper. This work follows previous studies aiming at either improving the Hamming weight model [2], or enhancing the DPA itself by various means [6,4].…”
Section: Introductionmentioning
confidence: 89%
“…Both approaches exhibit some limitations due to unrealistic assumptions and model imperfections that will be examined more thoroughly in this paper. This work follows previous studies aiming at either improving the Hamming weight model [2], or enhancing the DPA itself by various means [6,4].…”
Section: Introductionmentioning
confidence: 89%
“…Here, we propose another approach to extend the initial single-bit attack to a multi-bit one. This exactly corresponds to the proposal made by Bévan and Knudsen in [1], and consists in summing the absolute values of ∆ K,K (j, β) for several indices j. It has been proved that this kind of multi-bit DPA attack is not reducible to a CPA attack and is actually a valuable alternative in practice [10].…”
Section: Redefining To: Where To Take the Absolute Valuesmentioning
confidence: 54%
“…In [10], it has been proved that this attack is equivalent to the so-called CPA attack introduced in [4] up to a change of the attacker model 5 . In [1], it has been proposed to add the absolute values of the D K,j (instead of the values themselves) to build D K . This approach may be a valuable alternative in practice and it is not equivalent to a CPA [10].…”
Section: Basics On Dpa Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Messerges et al were the first to apply these techniques to public key implementations [21]. Later on, original DSCA has been improved by more efficient techniques such as the one based on the likelihood test proposed by Bevan et al [4], the Correlation Power Analysis (CPA) introduced by Brier et al [5], and more recent techniques like the Mutual Information Analysis (MIA) [14,24,25]. A common principle of all these techniques is that they require many power consumption or electromagnetic radiation curves to recover the secret manipulated.…”
Section: Introductionmentioning
confidence: 99%