A Systematic Appraisal of Side Channel Evaluation Strategies
暂无分享,去创建一个
Éliane Jaulmes | Nicolas Debande | François-Xavier Standaert | François Koeune | Davide Bellizia | Ileana Buhan | Melissa Azouaoui | Elisabeth Oswald | Carolyn Whitnall | Sébastien Duval | Christophe Giraud | Éliane Jaulmes | François-Xavier Standaert | E. Oswald | Nicolas Debande | C. Whitnall | F. Koeune | I. Buhan | Sébastien Duval | M. Azouaoui | Christophe Giraud | Davide Bellizia
[1] François-Xavier Standaert,et al. ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? , 2015, ASIACRYPT.
[2] Olivier Markowitch,et al. A Machine Learning Approach Against a Masked AES , 2013, CARDIS.
[3] Romain Poussier,et al. Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment , 2015, FSE.
[4] Stefan Mangard,et al. An AES Smart Card Implementation Resistant to Power Analysis Attacks , 2006, ACNS.
[5] Romain Poussier,et al. Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis) , 2015, COSADE.
[6] Sylvain Guilley,et al. Quantifying the Quality of Side-Channel Acquisitions , 2011 .
[7] Annelie Heuser,et al. Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines , 2012, COSADE.
[8] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[9] François-Xavier Standaert,et al. Soft Analytical Side-Channel Attacks , 2014, ASIACRYPT.
[10] Christof Paar,et al. Gaussian Mixture Models for Higher-Order Side Channel Analysis , 2007, CHES.
[11] François-Xavier Standaert,et al. Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device , 2015, EUROCRYPT.
[12] Elisabeth Oswald,et al. Counting Keys in Parallel After a Side Channel Attack , 2015, ASIACRYPT.
[13] François-Xavier Standaert,et al. Multi-Tuple Leakage Detection and the Dependent Signal Issue , 2019, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[14] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[15] Emmanuel Prouff,et al. Affine Masking against Higher-Order Side Channel Analysis , 2010, IACR Cryptol. ePrint Arch..
[16] Igor E. Shparlinski,et al. The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces , 2003, Des. Codes Cryptogr..
[17] François-Xavier Standaert,et al. Side-Channel Countermeasures’ Dissection and the Limits of Closed Source Security Evaluations , 2020 .
[18] Romain Poussier,et al. A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks , 2017, CHES.
[19] Cécile Canovas,et al. Kernel Discriminant Analysis for Information Extraction in the Presence of Masking , 2016, CARDIS.
[20] Cécile Canovas,et al. Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing , 2017, CHES.
[21] Romain Poussier,et al. Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach , 2016, CHES.
[22] Stefan Mangard,et al. Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness , 2004, CT-RSA.
[23] Olivier Markowitch,et al. A machine learning approach against a masked AES , 2014, Journal of Cryptographic Engineering.
[24] Olivier Markowitch,et al. Efficient Profiled Attacks on Masking Schemes , 2019, IEEE Transactions on Information Forensics and Security.
[25] Yuval Ishai,et al. Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.
[26] Amir Moradi,et al. Leakage assessment methodology , 2016, Journal of Cryptographic Engineering.
[27] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[28] Markus Kasper,et al. The World is Not Enough: Another Look on Second-Order DPA , 2010, IACR Cryptol. ePrint Arch..
[29] Emmanuel Prouff,et al. Statistical Analysis of Second Order Differential Power Analysis , 2009, IEEE Transactions on Computers.
[30] Elisabeth Oswald,et al. Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited , 2018, IACR Cryptol. ePrint Arch..
[31] François-Xavier Standaert,et al. Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note , 2012, ASIACRYPT.
[32] Stefan Mangard,et al. Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption , 2017, CHES.
[33] Elisabeth Oswald,et al. A Critical Analysis of ISO 17825 ('Testing methods for the mitigation of non-invasive attack classes against cryptographic modules') , 2019, IACR Cryptol. ePrint Arch..
[34] François-Xavier Standaert,et al. How (not) to Use Welch's T-test in Side-Channel Security Evaluations , 2018, IACR Cryptol. ePrint Arch..
[35] Christof Paar,et al. A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.
[36] Marcin Wójcik,et al. Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests , 2013, ASIACRYPT.
[37] Romain Poussier,et al. Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder , 2019, IACR Cryptol. ePrint Arch..
[38] François-Xavier Standaert,et al. Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version , 2015, Journal of Cryptology.
[39] François-Xavier Standaert,et al. Very High Order Masking: Efficient Implementation and Security Evaluation , 2017, IACR Cryptol. ePrint Arch..
[40] Naofumi Homma,et al. Cryptographic Hardware and Embedded Systems – CHES 2017 , 2017, Lecture Notes in Computer Science.
[41] François-Xavier Standaert,et al. Blind Source Separation from Single Measurements Using Singular Spectrum Analysis , 2015, CHES.
[42] Jasper G. J. van Woudenberg,et al. Improving Differential Power Analysis by Elastic Alignment , 2011, CT-RSA.
[43] François-Xavier Standaert,et al. Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA , 2009, CHES.
[44] François Durvaux,et al. From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces , 2016, EUROCRYPT.
[45] Elisabeth Oswald,et al. A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES , 2018, IACR Cryptol. ePrint Arch..
[46] Christof Paar,et al. Improving Side-Channel Analysis with Optimal Linear Transforms , 2012, CARDIS.
[47] Sergei Skorobogatov,et al. Synchronization method for SCA and fault attacks , 2011, Journal of Cryptographic Engineering.
[48] Christof Paar,et al. Building a Side Channel Based Disassembler , 2010, Trans. Comput. Sci..
[49] Tanja Lange,et al. Kangaroos in Side-Channel Attacks , 2014, CARDIS.