A Proposition for Correlation Power Analysis Enhancement

  title={A Proposition for Correlation Power Analysis Enhancement},
  author={Thanh-Ha Le and Jessy Cl{\'e}di{\`e}re and C{\'e}cile Canovas and Bruno Robisson and Christine Servi{\`e}re and Jean-Louis Lacoume},
Cryptographic devices are vulnerable to the nowadays well known side channel leakage analysis. Secret data can be revealed by power analysis attacks such as Simple Power Analysis (SPA), Differential Power Analysis (DPA) and Correlation Power Analysis (CPA). First, we give an overview of DPA in mono-bit and multi-bit cases. Next, the existing multi-bit DPA methods are generalized into the proposed Partitioning Power Analysis (PPA) method. Finally, we focus on the CPA technique, showing that this… CONTINUE READING
Highly Cited
This paper has 56 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 36 extracted citations

Univariate side channel attacks and leakage modeling

Journal of Cryptographic Engineering • 2011
View 4 Excerpts
Highly Influenced

Optimization of Pearson correlation coefficient calculation for DPA and comparison of different approaches

2017 IEEE 20th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS) • 2017
View 1 Excerpt

RFA: R-Squared Fitting Analysis Model for Power Attack

Security and Communication Networks • 2017

Survey of secure processors

2017 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS) • 2017
View 1 Excerpt

56 Citations

Citations per Year
Semantic Scholar estimates that this publication has 56 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 30 references

Clédière: What do S-boxes Say in Differential Side Channel Attacks

J. C. Canovas
Cryptology ePrint Archive, • 2008
View 2 Excerpts

Estimation statistique et sécurité des cartes à puces, évaluation d’attaques DPA évolués

R. Bevan
OCS, rapport de thèse, • 2004
View 1 Excerpt

Statistics and secret leakage

ACM Trans. Embedded Comput. Syst. • 2004
View 2 Excerpts

Flannery: Numerical Recipes in C++

W. H. Press, S. A. Teukolsky, W. T. Vetterling, B.P
View 1 Excerpt

Ways to Enhance DPA

R. Bevan, E. Knudsen
In proceedings of ICISC • 2002
View 2 Excerpts

Similar Papers

Loading similar papers…