Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest

[1]  Mitsugu Iwamoto,et al.  Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher , 2012, ICISC.

[2]  François-Xavier Standaert,et al.  An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks , 2012, IACR Cryptol. ePrint Arch..

[3]  Sylvain Guilley,et al.  RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[4]  Werner Schindler,et al.  A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models , 2012, CT-RSA.

[5]  Sylvain Guilley,et al.  "Rank Correction": A New Side-Channel Approach for Secret Key Recovery , 2011, InfoSecHiComNet.

[6]  Werner Schindler,et al.  How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis , 2011, 2011 14th Euromicro Conference on Digital System Design.

[7]  Sylvain Guilley,et al.  Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator , 2010, AFRICACRYPT.

[8]  Matthieu Rivain,et al.  On the Exact Success Rate of Side Channel Analysis in the Gaussian Model , 2009, Selected Areas in Cryptography.

[9]  Moti Yung,et al.  A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..

[10]  Christof Paar,et al.  Templates vs. Stochastic Methods , 2006, CHES.

[11]  Christof Paar,et al.  A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.

[12]  André K. Nieuwland,et al.  Reducing Cross-Talk Induced Power Consumption and Delay , 2004, PATMOS.

[13]  Christophe Clavier,et al.  Correlation Power Analysis with a Leakage Model , 2004, CHES.

[14]  I. Jolliffe Principal Component Analysis , 2005 .

[15]  Pankaj Rohatgi,et al.  Template Attacks , 2002, CHES.

[16]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[17]  Michael A. Saunders,et al.  LSQR: An Algorithm for Sparse Linear Equations and Sparse Least Squares , 1982, TOMS.

[18]  Yang Li,et al.  Clockwise Collision Analysis - Overlooked Side-Channel Leakage Inside Your Measurements , 2011, IACR Cryptol. ePrint Arch..

[19]  Takeo Kanade,et al.  Integrated Circuit and System Design. Power and Timing Modeling, Optimization, and Simulation , 2010, Lecture Notes in Computer Science.

[20]  François-Xavier Standaert,et al.  Improving the Rules of the DPA Contest , 2008, IACR Cryptol. ePrint Arch..

[21]  Christof Paar,et al.  Templates vs. stochastic methods : A performance analysis for side channel cryptanalysis , 2006 .

[22]  Oh-Kyong Kwon,et al.  A new on-chip interconnect crosstalk model and experimental verification for CMOS VLSI circuit design , 2000 .

[23]  Suresh Chari,et al.  A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards , 1999 .