A Systematic Appraisal of Side Channel Evaluation Strategies

[1]  François-Xavier Standaert,et al.  ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? , 2015, ASIACRYPT.

[2]  Olivier Markowitch,et al.  A Machine Learning Approach Against a Masked AES , 2013, CARDIS.

[3]  Romain Poussier,et al.  Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment , 2015, FSE.

[4]  Stefan Mangard,et al.  An AES Smart Card Implementation Resistant to Power Analysis Attacks , 2006, ACNS.

[5]  Romain Poussier,et al.  Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis) , 2015, COSADE.

[6]  Sylvain Guilley,et al.  Quantifying the Quality of Side-Channel Acquisitions , 2011 .

[7]  Annelie Heuser,et al.  Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines , 2012, COSADE.

[8]  Moti Yung,et al.  A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..

[9]  François-Xavier Standaert,et al.  Soft Analytical Side-Channel Attacks , 2014, ASIACRYPT.

[10]  Christof Paar,et al.  Gaussian Mixture Models for Higher-Order Side Channel Analysis , 2007, CHES.

[11]  François-Xavier Standaert,et al.  Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device , 2015, EUROCRYPT.

[12]  Elisabeth Oswald,et al.  Counting Keys in Parallel After a Side Channel Attack , 2015, ASIACRYPT.

[13]  François-Xavier Standaert,et al.  Multi-Tuple Leakage Detection and the Dependent Signal Issue , 2019, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[14]  Pankaj Rohatgi,et al.  Template Attacks , 2002, CHES.

[15]  Emmanuel Prouff,et al.  Affine Masking against Higher-Order Side Channel Analysis , 2010, IACR Cryptol. ePrint Arch..

[16]  Igor E. Shparlinski,et al.  The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces , 2003, Des. Codes Cryptogr..

[17]  François-Xavier Standaert,et al.  Side-Channel Countermeasures’ Dissection and the Limits of Closed Source Security Evaluations , 2020 .

[18]  Romain Poussier,et al.  A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks , 2017, CHES.

[19]  Cécile Canovas,et al.  Kernel Discriminant Analysis for Information Extraction in the Presence of Masking , 2016, CARDIS.

[20]  Cécile Canovas,et al.  Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing , 2017, CHES.

[21]  Romain Poussier,et al.  Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach , 2016, CHES.

[22]  Stefan Mangard,et al.  Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness , 2004, CT-RSA.

[23]  Olivier Markowitch,et al.  A machine learning approach against a masked AES , 2014, Journal of Cryptographic Engineering.

[24]  Olivier Markowitch,et al.  Efficient Profiled Attacks on Masking Schemes , 2019, IEEE Transactions on Information Forensics and Security.

[25]  Yuval Ishai,et al.  Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.

[26]  Amir Moradi,et al.  Leakage assessment methodology , 2016, Journal of Cryptographic Engineering.

[27]  Pankaj Rohatgi,et al.  Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.

[28]  Markus Kasper,et al.  The World is Not Enough: Another Look on Second-Order DPA , 2010, IACR Cryptol. ePrint Arch..

[29]  Emmanuel Prouff,et al.  Statistical Analysis of Second Order Differential Power Analysis , 2009, IEEE Transactions on Computers.

[30]  Elisabeth Oswald,et al.  Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited , 2018, IACR Cryptol. ePrint Arch..

[31]  François-Xavier Standaert,et al.  Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note , 2012, ASIACRYPT.

[32]  Stefan Mangard,et al.  Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption , 2017, CHES.

[33]  Elisabeth Oswald,et al.  A Critical Analysis of ISO 17825 ('Testing methods for the mitigation of non-invasive attack classes against cryptographic modules') , 2019, IACR Cryptol. ePrint Arch..

[34]  François-Xavier Standaert,et al.  How (not) to Use Welch's T-test in Side-Channel Security Evaluations , 2018, IACR Cryptol. ePrint Arch..

[35]  Christof Paar,et al.  A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.

[36]  Marcin Wójcik,et al.  Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests , 2013, ASIACRYPT.

[37]  Romain Poussier,et al.  Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder , 2019, IACR Cryptol. ePrint Arch..

[38]  François-Xavier Standaert,et al.  Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version , 2015, Journal of Cryptology.

[39]  François-Xavier Standaert,et al.  Very High Order Masking: Efficient Implementation and Security Evaluation , 2017, IACR Cryptol. ePrint Arch..

[40]  Naofumi Homma,et al.  Cryptographic Hardware and Embedded Systems – CHES 2017 , 2017, Lecture Notes in Computer Science.

[41]  François-Xavier Standaert,et al.  Blind Source Separation from Single Measurements Using Singular Spectrum Analysis , 2015, CHES.

[42]  Jasper G. J. van Woudenberg,et al.  Improving Differential Power Analysis by Elastic Alignment , 2011, CT-RSA.

[43]  François-Xavier Standaert,et al.  Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA , 2009, CHES.

[44]  François Durvaux,et al.  From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces , 2016, EUROCRYPT.

[45]  Elisabeth Oswald,et al.  A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES , 2018, IACR Cryptol. ePrint Arch..

[46]  Christof Paar,et al.  Improving Side-Channel Analysis with Optimal Linear Transforms , 2012, CARDIS.

[47]  Sergei Skorobogatov,et al.  Synchronization method for SCA and fault attacks , 2011, Journal of Cryptographic Engineering.

[48]  Christof Paar,et al.  Building a Side Channel Based Disassembler , 2010, Trans. Comput. Sci..

[49]  Tanja Lange,et al.  Kangaroos in Side-Channel Attacks , 2014, CARDIS.