How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis

@article{Heuser2011HowAS,
  title={How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis},
  author={A. Heuser and M. Kasper and W. Schindler and M. St{\"o}ttinger},
  journal={2011 14th Euromicro Conference on Digital System Design},
  year={2011},
  pages={674-681}
}
  • A. Heuser, M. Kasper, +1 author M. Stöttinger
  • Published 2011
  • Computer Science
  • 2011 14th Euromicro Conference on Digital System Design
  • Side-channel analysis has become an important field of research for the semiconductor industry and for the academic sector as well. Of particular interest is constructive side-channel analysis as it supports a target-oriented associated design process. The main goal is to increase the side-channel resistance of cryptographic implementations within the design phase by a combination of advanced stochastic methods with design methods, tools, and countermeasures. In this contribution we present a… CONTINUE READING
    Revealing side-channel issues of complex circuits by enhanced leakage models
    26
    Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
    24
    An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation
    1
    A Key to Success - Success Exponents for Side-Channel Distinguishers
    22
    Advances in SCA and RF-DNA Fingerprinting Through Enhanced Linear Regression Attacks and Application of Random Forest Classifiers
    3

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 17 REFERENCES
    A stochastic method for security evaluation of cryptographic FPGA implementations
    32
    A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version)
    714
    A Side-Channel Analysis Resistant Description of the AES S-Box
    315
    Mutual Information Analysis
    478
    Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking
    39
    Correlation Power Analysis with a Leakage Model
    1816