ECRYPT
The Side Channel Cryptanalysis Lounge
- What is already known? -

This lounge is provided within the European Network of Excellence (ECRYPT) as deliverable of the virtual lab VAMPIRE.

Navigator


Introduction

What is it all about?

Side Channel Cryptanalysis is a new research area of Applied Cryptanalysis that has gained more and more interest since the mid nineties. The research in this area has shown that (unintended) physical leakage caused by a 'straight-forward' implementation of a secure mathematical algorithm can be crucial in terms of security. For example, such a leakage can be sufficient to extract secret key material from cryptographic implementations. The efforts needed for side channel based attacks are still relatively low. On the other side, it turned out that the development of effective countermeasures is not a trivial task.

Related implementation based attacks are Fault Analysis scenarios which are active attacks and aim to cause (forced) physical leakage. Side Channel Cryptanalysis and Fault Analysis are definitively of practical importance for the development of products that are exposed to Implementation Attacks. Note that a developer of a secure product has to defend the product against all possible attack paths. An attacker is better off: the identification of one serious vulnerability can be sufficient to jeopardise the security claims.

It is important to stress that mathematical security of the cryptographic algorithms attacked is not being questioned by Side Channel Cryptanalysis and Fault Analysis. It is the implementation of these algorithms that is at risk to be broken.

In this lounge, we aim to give an introduction to this research area and to categorise and collect the current knowledge.


About us

The Side Channel Cryptanalysis Lounge is provided by the ECRYPT Network of Excellence (http://www.ecrypt.eu.org). It is maintained by the virtual lab VAMPIRE.

Feedback about the Side Channel Cryptanalysis Lounge can be sent by e-mail . Please inform us

  • if you are the author of a side-channel related work not listed below, or
  • if the reference to your work is incorrect, incomplete, or outdated.


Implementation Attacks

Traditionally, mathematical cryptanalysis assumes that the cryptographic device is an abstract machine that allows only the input and output data of the cryptographic algorithm to be used for cryptanalysis.

But, in reality other attacks are possible if the attacker has access to a cryptographic device and can play around with it.

These are Implementation Attacks which target the cryptographic device itself. These attacks can be Active Attacks which range from changing the environmental conditions to the physical opening of the cryptographic device. Another class of attacks acts in a passive way, just by observing the inherent leakage of the cryptographic device. These Passive Attacks are even more dangerous as they do not leave damage to the cryptographic device that can be recognised later on. Passive Attacks just use the cryptographic device in its intended environment and can obtain cryptographic keys by physical leakage. This additional information flow can be the power consumption of the device, electromagnetic radiation, timing information on the cryptographic service or error messages obtained.

Note that in real-life, combinations of active and passive approaches are possible.

Links:
Bruce Schneier in the Crypto-Gram Newsletter, June 15, 1998
Jean-Jaques Quisquater, François Koene: Side channel attacks: State of the Art (October 2002)

Active Attacks

One distinguishes three kinds of Active Attacks:

  • non-invasive Attacks,
  • semi-invasive Attacks and
  • invasive Attacks

Changes towards extreme environmental conditions put the cryptographic device under physical stress which may lead to an erroneous behaviour of the device. Malfunction can be caused,e. g., by short-time pulses in the supply voltage or by freezing down the environmental temperature. Though there is a certain risk of a permanent destruction of the cryptographic device, generally non-invasive environmental attacks do not leave specific damage. Many scenarios of Fault Analysis make use of non-invasive fault injections.

As the first step for opening of the cryptographic device, the package material has to be removed. If this is already sufficient for the specific type of attack we call the attack semi-invasive. Some more precise scenarios of Fault Analysis are semi-invasive. The costs of the necessary equipment are still moderate and the removal of the packaging can be done in a standard laboratory.

Nowadays, active attacks as physical probing and physical modification demand for semi-conductor equipment which is available in specialised laboratories only. Direct connections are made (i. e. to an internal bus line) to read out the cryptographic keys within the cryptographic device.

Note that a physical secure device does not offer external interface functions to the program and data memory in the end-user environment, as, e.g., debugging interfaces which are still available at standard microcontrollers.

To a certain extent, Fault Analysis attacks are considered as related to Side Channel Cryptanalysis. These approaches are discussed in more detail below (Fault Analysis). Invasive attacks are outside the scope of this lounge. Further, on invasive attacks, there's not much available in the open literature.


Links and Further Directions:
University of Cambridge: Security Group, TAMPER Laboratory
Steve H. Weingart: Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses (Abstract)
Sean W. Smith, Steve Weingart: Building a High-Performance, Programmable Secure Coprocessor
FIPS PUB 140-2: Security Requirements for Cryptographic Modules
PP/9806: Smartcard Integrated Circuit Protection Profile v2.0
BSI-PP-0002: Smartcard IC Platform Protection Profile, 1.0

Passive Attacks

One distinguishes two kinds of Passive Attacks:

  • Side-Channel Attacks, and
  • Logical Attacks

Side-Channel Attacks make use of the inherent physical leakage of the cryptographic device as an additional information channel for cryptanalysis. The tools needed for the measurement of this additional information flow are still in a low to moderate budget range. Side-Channel Attacks are discussed in more detail below (Side Channel Cryptanalysis).

Logical Attacks make use of the external logical functions of the cryptographic device and look for specific software or protocol bugs that can be exploited. Direct access to the cryptographic device is not necessary. Therefore, only software tools are needed. Logical Attacks as the famous Bleichenbacher attack on the RSA encryption standard PKCS#1 are outside of the scope of this lounge. These attacks can be prevented if error messages are kept simple: restrict them to be just PASS or FAIL. (If the verification fails because of a check on the padding format, do not tell this to the outside and be careful on special side channel leakage because of this check...).


Links and Further Directions:
D. Bleichenbacher: Chosen Ciphertext Attacks against Protocols Based on RSA Encryption Standard PKCS#1


Side Channel Cryptanalysis

Side Channel Cryptanalysis exploits the fact, that the cryptographic device itself leaks physical information during the processing of a cryptographic algorithm. This physical leakage (e. g., power dissipation, timing information, ... ) can be captured externally and can then be used to compromise secret keys of cryptographic algorithms by using standard statistical tools. Generally, all cryptographic algorithms are assumed to be vulnerable to side channel cryptanalysis if there are not special precautions in the implementation.

One distinguishes

  • Simple Side Channel Analysis, and
  • Differential Side Channel Analysis.

Simple Side Channel Analysis makes use of characteristics that are directly visible in one measurement trace. (If the noise is a dominant source, alternatively, an average trace using the same input data can be used.) The secret key needs to have some simple, exploitable relationship with the operations that are visible in the measurement trace. Typically, vulnerable implementations include key dependent branching.

Differential Side Channel Analysis looks for side channel differences that are not directly visible in one measurement trace. For their analysis, statistical methods have to be applied. A first order differential attack targets one specific intermediate result that shows up in a specific part of the measurement traces. A typical approach chooses a selection function, i.e., an intermediate result at the beginning or end of the cryptographic algorithm. The result of the selection function depends on the known input/output data and a small number of hypotheses on the key value. The outcome of the selection function leads to a partitioning of the overall measurement data for each hypothesis used. For the correct key hypothesis, different statistical properties of the two partitioning sets are expected at that points in time which depend on the result of the selection function. Higher order differential attacks are more sophisticated: they exploit multiple intermediate results that show up at different parts of the measurement traces.


The History:

In 1995, Timing Analysis was the first side-channel based attack ever published. Paul Kocher described the methodology to compromise keys of RSA, DSS and other cryptosystems by measuring the execution time for the overall cryptographic operation. This attack required an attacker to be able to simulate or predict the timing behaviour of the attacked device rather accurately.

In 1998, a much more efficient side-channel was introduced by Paul Kocher et al.: Power Analysis. The power consumed by a cryptographic device was analysed during the processing of the cryptographic operation. The power consumption turned out to include deterministic data-dependent parts which can be exploited by Simple Power Analysis and Differential Power Analysis. From now on, specific parts of the implementation of the cryptographic algorithms are observed. For instance, Simple Power Analysis looks at the key scheduling process; Differential Power Analysis chooses an intermediate result for testing of hypotheses on secret key values.

In 2000/2001, the use of Electromagnetic Emanation as side-channel was demonstrated by Jean-Jacques Quisquater and David Samyde as well as Karine Gandolfi et al.. These EM side channels include a higher variety of information and can be additionally applied from a certain distance.


Fundamental Links:
Cryptography Research: Paul Kocher et al.: Technical Papers
Manfred Aigner, Elisabeth Oswald: The DPA Tutorial
Jean-Jacques Quisquater, David Samyde: ElectroMagnetic Analysis (Abstract)
Karine Gandolfi, Christophe Mourtel, Francis Olivier: Electromagnetic Analysis: Concrete Results
Dakshi Agrawal and Bruce Archambeault and Josyula R. Rao and Pankaj Rohatgi: The EM Side-Channel(s)

Countermeasures

Countermeasures are relatively easy to implement for Timing Analysis: it is generally sufficient to make sure that the execution time is data-independent. Power Analysis attacks that look at (multiple) specific intermediate values of the implementation are much harder to defeat. The development of effective countermeasures turned out to be a difficult task. The approaches can be differentiated into

  • hardware-based countermeasures, and
  • software-based, algorithm-specific countermeasures.

Hardware countermeasures include special logic-styles that minimize the data-dependent leakage, noise generation and random process interrupts which provide an internal timing de-synchronisation. Software countermeasures aim to avoid the occurrence of predictable intermediate results. Generally, internal randomisation is used to mask the data representation used.



Fault Analysis

Fault attacks aim to cause errors during the processing of a cryptographic device. An additional information flow can be caused, if the cryptographic device returns erroneous cryptograms or a modified execution path is entered. For the exploitation of wrong cryptograms, mathematical cryptanalysis is applied.

The assumptions on the control of the fault location and fault occurrence time are manifold in different research papers. They reach from a simple random fault injection model to very precise control models.

Again, we distinguish

  • Simple Fault Analysis, and
  • Differential Fault Analysis.

Simple Fault Analysis exploits a direct relationship between a faulty result and the secret key in the implementation. The most prominent key exposure attack is pubished on an RSA-CRT implementation that can succeed with one fault. Other examples include the manipulation of security attributes that are stored or processed. Even the program flow can be disturbed which may lead to unforeseen events.

Differential Fault Analysis needs a certain number of faulty computational results using the same cryptographic key. Here one assumes that faults are caused in a transient way. The faulty outcomes are used to reduce the key space. Note that the practical relevance of an attack may depend strongly on the fault model used.

We like to point out that the behaviour of the implementation can be additionally controlled by side-channel information.


The History:

In 1996, Dan Boneh, Richard A. DeMillo and Richard J. Lipton reported that certain implementations of RSA and other algorithms are vulnerable assuming that a certain transient fault occurs during the processing ("The Bellcore Attack"). Especially, the RSA-CRT implementation is at extreme risk to be compromised using one erroneous result. At that time, this was only a theoretical finding that did not have the practical relevance.

Shortly after, in 1996, Eli Biham and Adi Shamir announced the approach of Differential Fault Analysis against secret cryptosystems as the DES. Herein, it is assumed that an attacker can invoke DES computations using the same - but unknown - plaintext. The useful faults are assumed to occur in the last (three) DES round(s). The wrong cryptograms revealed give a system of equations for the unknown key bits entering one S-Box in the last round that finally leads to the disclosure of the correct key value.

In 1999, Oliver Kömmerling and Markus Kuhn reported, that for the generation of faults, glitch attacks at the external power and clock supply lines are the most useful in practice.

A new class of fault induction attacks was revealed in 2002, as semi-invasive optical fault induction attacks were presented by Sergei P. Skorobogatov and Ross J. Anderson. These attacks allow a specific control of single registers which opens a new, precise perspective of the fault model. An alternative semi-invasive approach using eddy currents was presented by Jean-Jacques Quisquater and David Samyde.


Fundamental Links:
Dan Boneh, Richard A. DeMillo and Richard J. Lipton: On the importance of checking cryptographic protocols for faults
Eli Biham, Adi Shamir: Differential Fault Analysis of Secret Key Cryptosystems
Oliver Kömmerling and Markus Kuhn Design Principles for Tamper-Resistant Smartcard Processors
Sergei P. Skorobogatov and Ross J. Anderson Optical Fault Induction Attacks
David Samyde. Sergei P. Skorobogatov, Ross Anderson, Jean-Jacques Quisquater On a New Way to Read Data from Memory

Countermeasures

Countermeasures for Fault Analysis are initially relatively easy: it is required that the cryptographic device itself shall check that the result obtained is correct. In the simplest way, this can be done by computing the same operation twice as it is appropriate for critical instruction paths, but an additional protection should be in place to detect modifications of security variables (but be careful, in a side-channel secured way...). For crypto-based invertible operations, the result can be checked by calculating the inverse operation internally, e.g. check that the cryptogram gives the message back. Other countermeasures as in case of the RSA-CRT make use of certain control variables that are checked regularly. These countermeasures prevent from single faults even if they are precisely controlled. Nevertheless, it does not prevent from precisely controlled dual or multiple fault injections.

For an underlying hardware countermeasure, Sergei P. Skorobogatov and Ross J. Anderson proposed self-timed dual-rail-logic circuits that include an alarm mechanism.

Finally note that there are not any sufficient countermeasures in case the attacker has an ideal fault control using short-timed multiple fault injections. However, a large range of existing attacks should be defeated by a combination of hardware and software countermeasures in practice.



Glossary

Some terms and abbreviations are already established in the side channel literature which are summarised below.


AES Advanced Encryption Standard
CPA Correlation Power Analysis
DEMA Differential Electromagnetic Analysis
DES Data Encryption Standard
DPA Differential Power Analysis
ECC Elliptic Curve Cryptosystem
HECC Hyperelliptic Curve Cryptosystem
IPA Inferential Power Analysis
Hamming Weight Number of bits set to 1 (of a n-bit sized value).
MESD Multiple-Exponent, Single-Data
RSA Public-Key Algorithm invented by Rivest, Shamir, and Adleman
RSA-CRT Implementation of the RSA algorithm with the Chinese Remainder Theorem
Selection Function Function combining known input/output data and hypotheses on partial key data.
SEMA Simple Electromagnetic Analysis
SEMD Single-Exponent, Multiple-Data
SPA Simple Power Analysis
ZEMD Zero-Exponent, Multiple-Data


Categorisation of the Research Papers (to be updated)

For each sub-category, the publications are sorted chronologically.


Timing Analysis Methodology

Sub-Category Authors Title
IDEA John Kelsey, Bruce Schneier, David Wagner and Chris Hall [Side Channel Cryptanalysis of Product Ciphers]
Modular Exponentiation Paul C. Kocher [Timing Attacks on Implementations of Diffie-Hellmann, RSA, DSS, and Other Systems]
RSA-CRT (Montgomery) Werner Schindler [A Timing Attack against RSA with the Chinese Remainder Theorem]
DES Dan Page [Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel]
AES Daniel J. Bernstein [Cache-timing attacks on AES]



Power Analysis / Electromagnetic Analysis: Methodology

Sub-Category Authors Title
Address-Bit DPA Kouichi Itoh,Tetsuya Izu and Masahiko Takenaka [Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA]
Collision Attacks Kai Schramm, Thomas Wollinger and Christof Paar [A New Class of Collision Attacks and Its Application to DES]
Collision Attacks Hervé Ledig, Frédéric Muller and Frédéric Valette [Enhancing Collision Attacks]
CPA Eric Brier and Christophe Clavier and Francis Olivier [Correlation Power Analysis with a Leakage Model]
DEMA Karine Gandolfi, Christophe Mourtel and Francis Olivier [Electromagnetic Analysis: Concrete Results]
DPA Paul C. Kocher, Joshua Jaffe and Benjamin Jun [Differential Power Analysis]
EM Side Channels Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao and Pankaj Rohatgi [The EM Side-Channel(s)]
Hardware Countermeasures Christophe Clavier, Jean-Sébastien Coron and Nora Dabbous [Differential Power Analysis in the Presence of Hardware Countermeasures]
Hidden Markov Model Cryptanalysis Chris Karlof and David Wagner [Hidden Markov Model Cryptanalysis]
IPA Paul. N. Fahn and Peter K. Pearson [IPA: A New Class of Power Attacks]
Masked CMOS Gates Stefan Mangard, Thomas Popp and Berndt M. Gammel [Side-Channel Leakage of Masked CMOS Gates]
MESD Thomas S. Messerges, Ezzy A. Dabbish and Robert H. Sloan [Power Analysis Attacks of Modular Exponentiation in Smartcards]
Multi-Channel Attacks Dakshi Agrawal and Josyula R. Rao and Pankaj Rohatgi [Multi-channel Attacks]
Provable Security Silvio Micali and Leonid Reyzin [Physically Observable Cryptography]
Power Analysis Paul C. Kocher, Joshua Jaffe and Benjamin Jun [Differential Power Analysis]
Power Analysis Thomas S. Messerges, Ezzy A. Dabbish and Robert H.Sloan [Investigations of Power Analysis Attacks on Smartcards]
Power Analysis Mehdi-Laurent Akkar, Régis Bévan, Paul Dischamp and Didier Moyart [Power Analysis, What is Now Possible...]
Randomized BSD Representations Pierre-Alain Fouque and Frédéric Muller and Guillaume Poupard and Frédéric Valette [Defeating Countermeasures Based on Randomized BSD Representations]
Second-Order Power Analysis Thomas S. Messerges [Using Second-Order Power Analysis to Attack DPA Resistant Software]
Second-Order Power Analysis Jason Waddle and David Wagner [Towards Efficient Second Order Power Analysis]
SEMA Karine Gandolfi, Christophe Mourtel and Francis Olivier [Electromagnetic Analysis: Concrete Results]
SEMD Thomas S. Messerges, Ezzy A. Dabbish and Robert H. Sloan [Power Analysis Attacks of Modular Exponentiation in Smartcards]
SPA Paul C. Kocher, Joshua Jaffe and Benjamin Jun [Differential Power Analysis]
SPA Rita Mayer-Sommer [Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards]
Statistics Jean-Sébastien Coron, Paul Kocher and David Naccache [Statistics and Secret Leakage]
Stochastic Model Werner Schindler, Kerstin Lemke and Christof Paar [A Stochastic Model for Differential Side Channel Cryptanalysis]
Template Attacks Suresh Chari, Josyula R. Rao and Pankaj Rohatgi [Template Attacks]
ZEMD Thomas S. Messerges, Ezzy A. Dabbish and Robert H. Sloan [Power Analysis Attacks of Modular Exponentiation in Smartcards]



Power Analysis / Electromagnetic Analysis: Specific Algorithms


Sub-Category Authors Title
AES Francois-Xavier Standaert, Siddika Berna Örs and Bart Preneel [Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?]
AES Kai Schramm, Gregor Leander, Patrick Felke and Christof Paar [A Collision-Attack on AES Combining Side Channel- and Differential-Attack]
AES Stefan Mangard [A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion]
DES Paul C. Kocher, Joshua Jaffe and Benjamin Jun [Differential Power Analysis]
DES Thomas S. Messerges, Ezzy A. Dabbish and Robert H. Sloan [Investigations of Power Analysis Attacks on Smartcards]
DES Paul. N. Fahn and Peter K. Pearson [IPA: A New Class of Power Attacks]
DES John Kelsey, Bruce Schneier, David Wagner and Chris Hall [Side Channel Cryptanalysis of Product Ciphers]
DES Kai Schramm, Thomas Wollinger and Christof Paar [A New Class of Collision Attacks and Its Application to DES]
DES Eric Brier, Christophe Clavier and Francis Olivier [Correlation Power Analysis with a Leakage Model]
DES Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki and Maki Shigeri and Hiroshi Miyauchi [Cryptanalysis of DES Implemented on Computers with Cache]
ECC Jean-Sébastien Coron [Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems]
ECC Elisabeth Oswald [Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems]
ECC Catherine H. Gebotys and Robert J. Gebotys [Secure Elliptic Curve Implementations: An Analysis of Resistance to Power Attacks in a DSP Processor]
ECC Kouichi Itoh, Tetsuya Izu and Masahiko Takenaka [Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA]
ECC Louis Goubin [A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems]
ECC Siddika Berna Örs, Elisabeth Oswald and Bart Preneel [Power-Analysis Attacks on an FPGA - First Experimental Results]
IDEA Kerstin Lemke, Kai Schramm and Christof Paar [DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction]
HMAC RIPEMD-160, HMAC SHA-1 Kerstin Lemke, Kai Schramm and Christof Paar [DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction]
Modular Exponentiation Thomas S. Messerges, Ezzy A. Dabbish and Robert H. Sloan [Power Analysis Attacks of Modular Exponentiation in Smartcards]
Modular Exponentiation Pierre-Alain Fouque and Frederic Valette [The Doubling Attack - Why Upwards Is Better than Downwards]
Modular Exponentiation Colin Walter [Sliding Windows Succumbs to Big Mac Attack]
Modular Exponentiation (Montgomery) Colin D. Walter and Susan Thompson [Distinguishing Exponent Digits by Observing Modular Subtractions]
RC4 Suresh Chari, Josyula R. Rao and Pankaj Rohatgi [Template Attacks]
RC5 John Kelsey, Bruce Schneier, David Wagner, and Chris Hall [Side Channel Cryptanalysis of Product Ciphers]
RC6 Kerstin Lemke, Kai Schramm and Christof Paar [DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction]
RSA Roman Novak [SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation]
RSA-CRT Bert den Boer, Kerstin Lemke and Guntram Wicke [A DPA Attack against the Modular Reduction within a CRT Implementation of RSA]
RSA-CRT Pierre-Alain Fouque, Gwenaelle Martinet and Guillaume Poupard [Attacking Unbalanced RSA-CRT Using SPA]
RSA-CRT (Montgomery) Werner Schindler [A Combined Timing and Power Attack]



Power Analysis / Electromagnetic Analysis: Countermeasures


Sub-Category Authors Title
AES Mehdi-Laurent Akkar and Christophe Giraud [An Implementation of DES and AES, Secure against Some Attacks]
AES Elena Trichina, Domenico De Seta and Lucia Germani [Simplified Adaptive Multiplicative Masking for AES]
AES Jovan D. Golic and Christophe Tymen [Multiplicative Masking and Power Analysis of AES]
Bitslice Ciphers Joan Daemen, Michael Peeters and Gilles Van Assche [Bitslice Ciphers and Power Analysis Attacks]
Boolean and Arithmetic Operations Jean-Sébastien Coron and Louis Goubin [On Boolean and Arithmetic Masking against Differential Power Analysis]
Boolean and Arithmetic Operations Louis Goubin [A Sound Method for Switching between Boolean and Arithmetic Masking]
Boolean and Arithmetic Operations Jean-Sébastian Coron and Alexei Tchulkine [A New Algorithm for Switching from Arithmetic to Boolean Masking]
DES Louis Goubin and Jacques Patarin [DES and Differential Power Analysis - The "Duplication" Method]
DES Mehdi-Laurent Akkar and Christophe Giraud [An Implementation of DES and AES, Secure against Some Attacks]
ECC Jean-Sébastien Coron [Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems]
ECC M. Anwar Hasan [Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems]
ECC Marc Joye and Christophe Tymen [Protections against Differential Analysis for Elliptic Curve Cryptography: An Algebraic Approach]
ECC Pierre-Yvan Liardet and Nigel P. Smart [Preventing SPA/DPA in ECC Systems Using the Jacobi Form]
ECC Elena Trichina and Antonio Bellezza [Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks]
ECC Mathieu Ciet, Jean-Jacques Quisquater and Francesco Sica [Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication]
ECC (Hessian Curve) Marc Joye and Jean-Jacques Quisquater [Hessian Elliptic Curves and Side-Channel Attacks]
Hardware Adi Shamir [Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies]
Hardware David May, Henk L. Muller and Nigel P. Smart [Random Register Renaming to Foil DPA]
Hardware Kris Tiri and Ingrid Verbauwhede [Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology]
Hardware Jacques J.A. Fournier, Simon Moore, Huiyun Li and Robert Mullins and George Taylor [Security Evaluation of Asynchronous Circuits]
Hardware Thomas Popp and Stefan Mangard [Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints]
Hardware Wieland Fischer and Berndt M. Gammel [Masking at Gate Level in the Presence of Glitches]
Modular Exponentiation Christophe Clavier and Marc Joye [Universal Exponentiation Algorithm: A First Step towards Provable SPA-Resistance]
Key Splitting Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankay Rohatgi [Towards Sound Approaches to Counteract Power-Analysis Attacks]
HECC Roberto M. Avanzi [Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems]
Modular Exponentiation Colin D. Walter [MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis]
Modular Exponentiation Marc Joye and Sung-Ming Yen [The Montgomery Powering Ladder]



Listing of Research Papers



Article [ HeviaKiwi99 ]
Alejandro Hevia and Marcos Kiwi
Strength of Two Data Encryption Standard Implementations under Timing Attacks
ACM Transactions on Information and System Security, 1999 , 2 , 416-437
Full Paper:
http://www.cse.ucsd.edu/~ahevia/publications/hk98tissec.ps.gz


Article [ KelseySchneierWagnerHall00 ]
John Kelsey, Bruce Schneier, David Wagner, and Chris Hall
Side Channel Cryptanalysis of Product Ciphers
Journal of Computer Security, 2000 , 8 , 141-158
Key Words:
side channels, cryptanalysis, timing attacks, product ciphers
Full Paper:
http://www.schneier.com/paper-side-channel.html


Article [ MessergesDabbishSloan02 ]
Thomas S. Messerges and Ezzy A. Dabbish and Robert H. Sloan
Examining smart-card security under the threat of power analysis attacks
IEEE Transactions on Computers, 2002 , 51 , 541-552


Article [ Chevallier-MamesCietJoye03 ]
B. Chevallier-Mames and M. Ciet and M. Joye
Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
IEEE Transactions on Computers, 2004 , 53 , 760-768


Article [ DelivasilisKatsikas06 ]
Dimitrios L. Delivasilis and Sokratis K. Katsikas
Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices
International Journal of Network Security, 2006 , 3 , 44-50
Key Words:
Biometrics, key generation algorithms, side channel attacks
Full Paper:
http://ijns.nchu.edu.tw/contents/ijns-v3-n1/ijns-2006-v3-n1-p44-50.pdf


Book [ DPAbook ]
Stefan Mangard and Elisabeth Oswald and Stefan Popp
Power Analysis Attacks: Revealing the Secrets of Smart Cards
Springer, 2007
Abstract:
http://www.dpabook.org/about/abstract/index.htm


Inproceedings [ Kocher96 ]
Paul C. Kocher
Timing Attacks on Implementations of Diffie--Hellman, RSA, DSS, and Other Systems
N. Koblitz (ed.), Advances in Cryptology -- CRYPTO '96, Springer-Verlag, 1996 , LNCS , 1109 , 104-113
Key Words:
Timing attack, cryptanalysis, RSA, Diffie-Hellman, DSS
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1109/11090104.htm
Full Paper:
http://www.cryptography.com/resources/whitepapers/TimingAttacks.pdf


Inproceedings [ ChariJutlaRaoRohatgi99 ]
Suresh Chari and Charanjit S. Jutla and Josyula R. Rao and Pankay Rohatgi
Towards Sound Approaches to Counteract Power-Analysis Attacks
M. Wiener (ed.), Advances in Cryptology -- CRYPTO '99, Springer-Verlag, 1999 , LNCS , 1666 , 398-412
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1666/16660398.htm


Inproceedings [ KocherJaffeJun99 ]
Paul C. Kocher and Joshua Jaffe and Benjamin Jun
Differential Power Analysis
M. Wiener (ed.), Advances in Cryptology -- CRYPTO '99, Springer-Verlag, 1999 , LNCS , 1666 , 388-397
Key Words:
differential power analysis, DPA, SPA, cryptanalysis, DES
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1666/16660388.htm
Full Paper:
http://www.cryptography.com/resources/whitepapers/DPA.pdf


Inproceedings [ Coron99 ]
Jean-Sébastian Coron
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
Ç.K. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 1999, Springer-Verlag, 1999 , LNCS , 1717 , 292-302
Key Words:
Elliptic curve, power consumption, Differential Power Analysis
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1717/17170292.htm
Full Paper:
http://www.gemplus.com/smart/rd/publications/pdf/Cor99dpa.pdf


Inproceedings [ FahnPearson99 ]
Paul. N. Fahn and Peter K. Pearson
IPA: A New Class of Power Attacks
Ç.K. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 1999, Springer-Verlag, 1999 , LNCS , 1717 , 173-186
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1717/17170173.htm


Inproceedings [ GoubinPatarin99 ]
Louis Goubin and Jacques Patarin
DES and Differential Power Analysis - The "Duplication" Method
Ç.K. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 1999, Springer-Verlag, 1999 , LNCS , 1717 , 158-172
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1717/17170158.htm


Inproceedings [ MessergesDabbishSloan99CHES ]
Thomas S. Messerges and Ezzy A. Dabbish and Robert H. Sloan
Power Analysis Attacks of Modular Exponentiation in Smartcards
Ç.K. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 1999, Springer-Verlag, 1999 , LNCS , 1717 , 144-157
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1717/17170144.htm


Inproceedings [ BihamShamirS99 ]
Eli Biham and Adi Shamir
Power Analysis of the Key Scheduling of the AES Candidates
Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference, 1999
Full Paper:
http://csrc.nist.gov/CryptoToolkit/aes/round1/conf2/papers/biham3.pdf


Inproceedings [ ChariJutlaRaoRohatgi99AES ]
Suresh Chari and Charanjit Jutla and Josyula R. Rao and Pankaj Rohatgi
A Cautionary Note Regarding Evaluation of AES Candidates on Smart Cards
Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference, 1999
Full Paper:
http://csrc.nist.gov/CryptoToolkit/aes/round1/conf2/papers/chari.pdf


Inproceedings [ DaemenRijmen99 ]
Joan Daemen and Vincent Rijmen
Resistance Against Implementation Attacks: A Comparative Study of the AES Proposals
Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference, 1999
Full Paper:
http://csrc.nist.gov/CryptoToolkit/aes/round1/conf2/papers/daemen.pdf


Inproceedings [ MessergesDabbishSloan99USENIX ]
Thomas S. Messerges and Ezzy A. Dabbish and Robert H. Sloan
Investigations of Power Analysis Attacks on Smartcards
Proceedings of USENIX Workshop on Smartcard Technology, 1999 , 151-162
Full Paper:
http://www.usenix.org/events/smartcard99/full_papers/messerges/messerges.pdf


Inproceedings [ ClavierCoronDabbous00 ]
Christophe Clavier and Jean-Sébastian Coron and Nora Dabbous
Differential Power Analysis in the Presence of Hardware Countermeasures
Ç.K. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2000, Springer-Verlag, 2000 , LNCS , 1965 , 252-263
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1965/19650252.htm
Full Paper:
http://www.gemplus.com/smart/rd/publications/pdf/CCD00dpa.pdf


Inproceedings [ CoronGoubin00 ]
Jean-Sébastian Coron and Louis Goubin
On Boolean and Arithmetic Masking against Differential Power Analysis
Ç.K. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2000, Springer-Verlag, 2000 , LNCS , 1965 , 231-237
Key Words:
Physical attacks, Differential Power Analysis, Electric consumption, AES, IDEA, Smartcards, Masking Techniques
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1965/19650231.htm
Full Paper:
http://www.gemplus.com/smart/rd/publications/pdf/CG00mask.pdf


Inproceedings [ Hasan00 ]
M. Anwar Hasan
Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems
Ç.K. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2000, Springer-Verlag, 2000 , LNCS , 1965 , 93-108
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1965/19650093.htm


Inproceedings [ Messerges00 ]
Thomas S. Messerges
Using Second-Order Power Analysis to Attack DPA Resistant Software
Ç.K. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2000, Springer-Verlag, 2000 , LNCS , 1965 , 238-251
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1965/19650238.htm


Inproceedings [ Schindler00 ]
Werner Schindler
A Timing Attack against RSA with the Chinese Remainder Theorem
Ç.K. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2000, Springer-Verlag, 2000 , LNCS , 1965 , 109-124
Key Words:
Timing attack, RSA, Chinese Remainder Theorem, Montgomery multiplication
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1965/19650109.htm


Inproceedings [ Shamir00CHES ]
Adi Shamir
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Ç.K. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2000, Springer-Verlag, 2000 , LNCS , 1965 , 71-77
Key Words:
Smart cards, power analysis, SPA, DPA
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1965/19650071.htm


Inproceedings [ Sommer00 ]
Rita Mayer-Sommer
Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards
Ç.K. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2000, Springer-Verlag, 2000 , LNCS , 1965 , 78-92
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1965/19650078.htm


Inproceedings [ AkkarBevanDischamp00 ]
Mehdi-Laurent Akkar and Régis Bévan and Paul Dischamp and Didier Moyart
Power Analysis, What is Now Possible...
T. Okamoto (ed.), Advances in Cryptology, Proceedings of ASIACRYPT 2000, Springer-Verlag, 2000 , LNCS , 1976 , 489-502
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1976/19760489.htm


Inproceedings [ CoronKocherNaccache01 ]
Jean-Sébastian Coron and Paul Kocher and David Naccache
Statistics and Secret Leakage
Y. Frankel (ed.), Financial Cryptography (FC 2000), Springer-Verlag, 2001 , LNCS , 1962 , 157-173
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1962/19650157.htm
Full Paper:
http://www.gemplus.com/smart/rd/publications/pdf/CKN01lea.pdf


Inproceedings [ DaemenPeetersVanAssche00 ]
Joan Daemen and Michael Peeters and Gilles Van Assche
Bitslice Ciphers and Power Analysis Attacks
Bruce Schneier (ed.), Fast Software Encryption, FSE 2000, Springer-Verlag, 2001 , LNCS , 1978 , 134-149
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1978/19650134.htm
Full Paper:
http://protonworld.st.com/research/docs/bitsliceDPA.pdf


Inproceedings [ Messerges00FSE ]
Thomas S. Messerges
Securing the AES Finalists Against Power Analysis Attacks
Bruce Schneier (ed.), Fast Software Encryption, FSE 2000, Springer-Verlag, 2001 , LNCS , 1978 , 150-164
Abstract:
http://link.springer.de/link/service/series/0558/bibs/1978/19650150.htm


Inproceedings [ WalterThompson01 ]
Colin D. Walter and Susan Thompson
Distinguishing Exponent Digits by Observing Modular Subtractions
David Naccache (ed.), Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, Springer-Verlag, 2001 , LNCS , 2020 , 192-207
Key Words:
Exponentiation, modular multiplication, Montgomery multiplication, RSA cryptosystem, m-ary method, sliding windows, timing attack, power analysis
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2020/20200192.htm
Full Paper:
http://www.comodogroup.com/research/crypto/CDW_RSA_2001.ps


Inproceedings [ QuisquaterSamyde01 ]
Jean-Jacques Quisquater and David Samyde
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smard Cards
I. Attali and T. Jensen (ed.), Proceedings of Smart Card Programming and Security (E-smart 2001), Springer-Verlag, 2001 , LNCS , 2140 , 200-210


Inproceedings [ AkkarGiraud01 ]
Mehdi-Laurent Akkar and Christophe Giraud
An Implementation of DES and AES, Secure against Some Attacks
Ç Koç and D. Naccache and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag, 2001 , LNCS , 2162 , 309-318
Key Words:
AES, Rijndael, DES, Transformed mask, Multiplicative mask, Power analysis, DPA, SPA, Smart Cards
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2162/21620309.htm


Inproceedings [ BrierHandschuhTymen01 ]
Eric Brier and Helena Handschuh and Christophe Tymen
Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware
Ç Koç and D. Naccache and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag, 2001 , LNCS , 2162 , 16-27
Key Words:
Tamper-resistance, Probing attacks, Data scrambling, Keyed permutations, Smart-cards
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2162/21620016.htm
Full Paper:
http://www.gemplus.com/smart/rd/publications/pdf/BHT01scr.pdf


Inproceedings [ ClavierJoye01 ]
Christophe Clavier and Marc Joye
Universal Exponentiation Algorithm: A First Step towards Provable SPA-Resistance
Ç Koç and D. Naccache and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag, 2001 , LNCS , 2162 , 300-308
Key Words:
Implementation, exponentiation, RSA cryptosystem, discrete logarithm, side-channel attacks, simple power analysis (SPA), addition chains, provable security, smart-cards
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2162/21620300.htm
Full Paper:
http://www.gemplus.com/smart/rd/publications/pdf/CJ01univ.pdf


Inproceedings [ GandolfiMourtelOlivier01 ]
Karine Gandolfi and Christophe Mourtel and Francis Olivier
Electromagnetic Analysis: Concrete Results
Ç Koç and D. Naccache and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag, 2001 , LNCS , 2162 , 251-261
Key Words:
smart cards, side channel leakage, electromagnetic analysis, SEMA, DEMA, DPA, SPA
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2162/21620251.htm


Inproceedings [ Goubin01 ]
Louis Goubin
A Sound Method for Switching between Boolean and Arithmetic Masking
Ç Koç and D. Naccache and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag, 2001 , LNCS , 2162 , 3-15
Key Words:
Physical attacks, Differential Power Analysis, Electric consumption, AES, IDEA, Smartcards, Masking Techniques
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2162/21620003.htm


Inproceedings [ JoyeQuisquater01 ]
Marc Joye and Jean-Jacques Quisquater
Hessian Elliptic Curves and Side-Channel Attacks
Ç Koç and D. Naccache and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag, 2001 , LNCS , 2162 , 402-410
Key Words:
Elliptic curves, Cryptography, Side-channel attacks, Implementation, Smart-cards
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2162/21620402.htm
Full Paper:
http://www.gemplus.com/smart/rd/publications/pdf/JQ01hess.pdf


Inproceedings [ JoyeTymen01 ]
Marc Joye and Christophe Tymen
Protections against Differential Analysis for Elliptic Curve Cryptography: An Algebraic Approach
Ç Koç and D. Naccache and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag, 2001 , LNCS , 2162 , 377-390
Key Words:
Public-key cryptography, Side-channel attacks, Differential power analysis (DPA), Timing attacks, Elliptic curves, Smart-cards
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2162/21620377.htm
Full Paper:
http://www.gemplus.com/smart/rd/publications/pdf/JT01edpa.pdf


Inproceedings [ LiardetSmart01 ]
Pierre-Yvan Liardet and Nigel P. Smart
Preventing SPA/DPA in ECC Systems Using the Jacobi Form
Ç Koç and D. Naccache and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag, 2001 , LNCS , 2162 , 391-401
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2162/21620391.htm


Inproceedings [ MayMullerSmart01 ]
David May and Henk L. Muller and Nigel P. Smart
Random Register Renaming to Foil DPA
Ç Koç and D. Naccache and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag, 2001 , LNCS , 2162 , 28-38
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2162/21620028.htm


Inproceedings [ OswaldAigner01 ]
Elisabeth Oswald and Manfred Aigner
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
Ç Koç and D. Naccache and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag, 2001 , LNCS , 2162 , 39-50
Key Words:
Power Analysis, Elliptic Curve Cryptosystems
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2162/21620039.htm
Full Paper:
http://www.iaik.tugraz.at/research/sca-lab/publications/pdf/Oswald2001RandomizedAddition-SubtractionChains.pdf


Inproceedings [ Walter01 ]
Colin Walter
Sliding Windows Succumbs to Big Mac Attack
Ç Koç and D. Naccache and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag, 2001 , LNCS , 2162 , 286-299
Key Words:
Cryptography, RSA, differential power analysis, blinding, DPA, smart card, exponentiation, sliding windows
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2162/21620286.htm
Full Paper:
http://www.comodogroup.com/research/crypto/CDW_Ches2001.ps


Inproceedings [ Moeller01 ]
B. Möller
Securing elliptic curve point multiplication against side-channel attacks
G.I. Davida and Y. Frankel (ed.), Information Security, Springer-Verlag, 2001 , LNCS , 2200 , 324-334


Inproceedings [ YenKimLimMoon01 ]
Sung-Ming Yen and Seungjoo Kim and Seongan Lim and Sang-Jae Moon
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack.
Kwangjo Kim (ed.), Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, Springer, 2001 , LNCS , 2288
Key Words:
Cryptography, Exponentiation, Hardware fault cryptanalysis, Physical cryptanalysis, Power analysis attack, Side channel attack, Square-multiply exponentiation, Timing attack.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2288/22880414.htm


Inproceedings [ JoyeQuisquaterYenYung02 ]
Marc Joye and Jean-Jacques Quisquater and Sung-Ming Yen and Moti Yung
Observability Analysis -- Detecting When Improved Cryptosystems Fail
Bart Preneel (ed.), Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, Springer-Verlag, 2002 , LNCS , 2271 , 17-29
Key Words:
Security analysis, observability, cryptanalysis, implementations, side-channel attacks, fault analysis, robustness, cryptosystems
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2271/22710017.htm
Full Paper:
http://www.gemplus.com/smart/rd/publications/pdf/JQYY02px.pdf


Inproceedings [ Walter02CTRSA ]
Colin D. Walter
MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis
Bart Preneel (ed.), Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, Springer-Verlag, 2002 , LNCS , 2271 , 53-66
Key Words:
Mist exponentiation algorithm, division chains, addition chains, power analysis, DPA, blinding, smart card
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2271/22710053.htm
Full Paper:
http://www.comodogroup.com/research/crypto/CDW_RSA_2002_Mist.ps


Inproceedings [ BrierJoye02 ]
Eric Brier and Marc Joye
Weierstra Elliptic Curves and Side-Channel Attacks
David Naccache and Pascal Paillier (ed.), Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Springer-Verlag, 2002 , LNCS , 2274 , 335-345
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2274/22740335.htm
Full Paper:
http://www.gemplus.com/smart/rd/publications/pdf/BJ02espa.pdf


Inproceedings [ IzuTakagi02 ]
Tetsuya Izu and Tsuyoshi Takagi
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks
David Naccache and Pascal Paillier (ed.), Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Springer-Verlag, 2002 , LNCS , 2274 , 280-296
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2274/22740280.htm


Inproceedings [ Novak02 ]
Roman Novak
SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation
David Naccache and Pascal Paillier (ed.), Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Springer-Verlag, 2002 , LNCS , 2274 , 252-262
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2274/22740252.htm


Inproceedings [ Schindler02 ]
Werner Schindler
A Combined Timing and Power Attack
David Naccache and Pascal Paillier (ed.), Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Springer-Verlag, 2002 , LNCS , 2274 , 263-279
Key Words:
Timing attack, power attack, Montgomery's algorithm
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2274/22740263.htm


Inproceedings [ Kelsey02 ]
John Kelsey
Compression and Information Leakage of Plaintext.
Fast Software Encryption, 9th International Workshop, FSE 2002 , Springer, 2002 , LNCS , 2365 , 263-276
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2365/23650263.htm


Inproceedings [ HitchcockMontague02 ]
Y. Hitchcock and P. Montague
A new elliptic curve scalar multiplication algorithm to resist simple power analysis
L.M.~Batten and J.~Seberry (ed.), Information Security and Privacy -- ACISP 2002, Springer-Verlag, 2002 , LNCS , 2384 , 214-225


Inproceedings [ Goubin03 ]
Louis Goubin
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
Yvo Desmedt (ed.), Public Key Cryptography - PKC 2003, Springer-Verlag, 2002 , LNCS , 2567 , 199-210
Key Words:
Public-key cryptography, Side-channel attacks, Power Analysis, Differential Power Analysis (DPA), Elliptic curves, Smartcards
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2567/25670199.htm


Inproceedings [ Kuehn03 ]
Ulrich Kühn
Side-Channel Attacks on Textbook RSA and ElGamal Encryption
Yvo Desmedt (ed.), Public Key Cryptography - PKC 2003, Springer-Verlag, 2002 , LNCS , 2567 , 324-336
Key Words:
RSA encryption, ElGamal encryption, Side-channel attack
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2567/25670324.htm


Inproceedings [ AgrawalArchambeaultRaoRohatgi02 ]
Dakshi Agrawal and Bruce Archambeault and Josyula R. Rao and Pankaj Rohatgi
The EM Side-Channel(s)
B. S. Kaliski and Ç Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag, 2003 , LNCS , 2523 , 29-45
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2523/25230029.htm
Full Paper:
http://www.research.ibm.com/intsec/emf-paper.ps


Inproceedings [ ChariRaoRohatgi02 ]
Suresh Chari and Josyula R. Rao and Pankaj Rohatgi
Template Attacks
B. S. Kaliski and Ç Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems, Springer-Verlag, 2003 , LNCS , 2523 , 13-28
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2523/25230013.htm


Inproceedings [ CietQuisquaterSica02 ]
Mathieu Ciet and Jean-Jacques Quisquater and Francesco Sica
Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication
B. S. Kaliski and Ç Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag, 2003 , LNCS , 2523 , 540-550
Key Words:
Public key cryptography, differential power analysis, elliptic curve cryptosystem, fast computation
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2523/25230540.htm


Inproceedings [ DenBoerLemkeWicke02 ]
Bert den Boer and Kerstin Lemke and Guntram Wicke
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA
B. S. Kaliski and Ç Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag, 2003 , LNCS , 2523 , 228-243
Key Words:
DPA, modular reduction, CRT, RSA, power analysis, side channel analysis, smartcard
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2523/25230228.htm


Inproceedings [ GebotysGebotys02 ]
Catherine H. Gebotys and Robert J. Gebotys
Secure Elliptic Curve Implementations: An Analysis of Resistance to Power Attacks in a DSP Processor
B. S. Kaliski and Ç Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag, 2003 , LNCS , 2523 , 114-128
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2523/25230114.htm


Inproceedings [ GolicTymen02 ]
Jovan D. Goli and Christophe Tymen
Multiplicative Masking and Power Analysis of AES
B. S. Kaliski and Ç Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag, 2003 , LNCS , 2523 , 198-212
Key Words:
AES, differential power analysis, countermeasures, multiplicative masking
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2523/25230198.htm
Full Paper:
http://www.gemplus.com/smart/rd/publications/pdf/GT03perm.pdf


Inproceedings [ HaMoon02 ]
Jae Cheol Ha and Sang Jae Moon
Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks
B. S. Kaliski and Ç Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag, 2003 , LNCS , 2523 , 551-563
Key Words:
Elliptic curve cryptosystems, Side-channel attack, Power analysis attack, SPA, DPA, Non-adjacent form
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2523/25230551.htm


Inproceedings [ ItohIzuTakenaka02 ]
Kouichi Itoh and Tetsuya Izu and Masahiko Takenaka
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA
B. S. Kaliski and Ç Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag, 2003 , LNCS , 2523 , 129-143
Key Words:
Differential power analysis (DPA), address-bit DPA, elliptic curve cryptosystems (ECC), scalar exponentiation, OK-ECDH, OK-ECDSA
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2523/25230129.htm


Inproceedings [ ItohYajimaMasahikoNaoya02 ]
Kouichi Itoh and Jun Yajima and Masahiko Takenaka and Naoya Torii
DPA Countermeasures by Improving the Window Method
B. S. Kaliski and Ç Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag, 2003 , LNCS , 2523 , 303-317
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2523/25230303.htm


Inproceedings [ JoyeYen02 ]
Marc Joye and Sung-Ming Yen
The Montgomery Powering Ladder
B. S. Kaliski and Ç Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag, 2003 , LNCS , 2523 , 291-302
Key Words:
Exponentiation algorithms, Montgomery powering ladder, constrained environments, cryptographic implementations, fault attacks, side-channel attacks
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2523/25230291.htm
Full Paper:
http://www.gemplus.com/smart/rd/publications/pdf/JY03mont.pdf


Inproceedings [ KlimaRosa02 ]
Vlastimil Klíma and Tomás Rosa
Further Results and Considerations on Side Channel Attacks on RSA
B. S. Kaliski and Ç Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag, 2003 , LNCS , 2523 , 244-259
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2523/25230244.htm


Inproceedings [ Oswald02 ]
Elisabeth Oswald
Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems
B. S. Kaliski and Ç Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag, 2003 , LNCS , 2523 , 82-97
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2523/25230082.htm
Full Paper:
http://www.iaik.tugraz.at/research/sca-lab/publications/pdf/Oswald2003EnhancingSimplePower-Analysis.pdf


Inproceedings [ TrichinaBellezza02 ]
Elena Trichina and Antonio Bellezza
Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks
B. S. Kaliski and Ç Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag, 2003 , LNCS , 2523 , 98-113
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2523/25230098.htm


Inproceedings [ TrichinaDeSetaGermani02 ]
Elena Trichina and Domenico De Seta and Lucia Germani
Simplified Adaptive Multiplicative Masking for AES
B. S. Kaliski and Ç Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag, 2003 , LNCS , 2523 , 187-197
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2523/25230187.htm


Inproceedings [ Walter02 ]
Colin D. Walter
Some Security Aspects of the Mist Randomized Exponentiation Algorithm
B. S. Kaliski and Ç Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag, 2003 , LNCS , 2523 , 276-290
Key Words:
Randomary Exponentiation, Mist exponentation algorithm, division chains, additions chains, power analysis, DPA, DEMA, blinding, smartcard
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2523/25230276.htm
Full Paper:
http://www.comodogroup.com/research/crypto/CDW_2002.ps


Inproceedings [ BevanKnudsen03 ]
Régis Beván and Erik Knudsen
Ways to Enhance Differential Power Analysis
Pil Joong Lee and Chae Hoon Lim (ed.), Information Security and Cryptology - ICISC 2002, Springer-Verlag, 2003 , LNCS , 2587 , 327-342
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2587/25870327.htm


Inproceedings [ Mangard03 ]
Stefan Mangard
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion
Pil Joong Lee and Chae Hoon Lim (ed.), Information Security and Cryptology - ICISC 2002, Springer-Verlag, 2003 , LNCS , 2587 , 343-358
Key Words:
Smart Cards, Power Analysis, SPA, AES, Key Expansion, Key Scheduling
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2587/25870343.htm
Full Paper:
http://www.iaik.tugraz.at/research/sca-lab/publications/pdf/Mangard2003ASimplePower-Analysis.pdf


Inproceedings [ SakuraiTakagi03 ]
Kouichi Sakurai and Tsuyoshi Takagi
A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem
Pil Joong Lee and Chae Hoon Lim (ed.), Information Security and Cryptology - ICISC 2002, Springer-Verlag, 2003 , LNCS , 2587 , 359-373
Key Words:
EPOC-2, chosen ciphertext attack, reject function, timing attack, factoring, Manger's attack
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2587/25870359.htm


Inproceedings [ OkeyaTakagi03CTRSA ]
Katsuyuki Okeya and Tsuyoshi Takagi
The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks
Marc Joye (ed.), Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, Springer-Verlag, 2003 , LNCS , 2612 , 328-342
Key Words:
Elliptic curve cryptosystem, side channel attacks, width-w NAF, pre-computation table, smart card, memory constraint
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2612/26120328.htm


Inproceedings [ Walter03 ]
Colin D. Walter
Seeing through MIST Given a Small Fraction of an RSA Private Key
Marc Joye (ed.), Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, Springer-Verlag, 2003 , LNCS , 2612 , 391-402
Key Words:
Addition chains, division chains, randomized exponentiation, Mist, randomary exponentiation, RSA, side channel leakage, power analysis, SPA, DPA, SEMA, DEMA, blinding, smartcard
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2612/26120391.htm
Full Paper:
http://www.comodogroup.com/research/crypto/CDW_RSA_2003.ps


Inproceedings [ BilletJoye03 ]
O. Billet and M. Joye
The Jacobi model of an elliptic curve and side-channel analysis
M. Fossorier and T. H}holdt and A. Poli (ed.), Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, Springer-Verlag, 2003 , LNCS , 2643 , 34-42


Inproceedings [ Yen03 ]
Sung-Ming Yen
Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces.
Reihaneh Safavi-Naini and Jennifer Seberry (ed.), Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, Springer, 2003 , LNCS , 2727 , 106-117
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2727/27270106.htm


Inproceedings [ AgrawalRaoRohatgi03 ]
Dakshi Agrawal and Josyula R. Rao and Pankaj Rohatgi
Multi-channel Attacks
C. Walter and Ç. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag, 2003 , LNCS , 2779 , 2-16
Key Words:
Side-channel attacks, Power Analysis, EM Analysis, DPA, DEMA
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2779/27790002.htm
Full Paper:
http://www.research.ibm.com/people/a/agrawal/publications/CHES2003.pdf


Inproceedings [ Avanzi03 ]
Roberto M. Avanzi
Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems
C. Walter and Ç. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag, 2003 , LNCS , 2779 , 366-381
Key Words:
Public-key cryptography, Side-channel attacks, Differential power analysis (DPA), Timing attacks, Hyperelliptic curves, Smart cards
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2779/27790366.htm


Inproceedings [ CathaloKoeuneQuisquater03 ]
Julien Cathalo and François Koeune and Jean-Jacques Quisquater
A New Type of Timing Attack: Application to GPS
C. Walter and Ç. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag, 2003 , LNCS , 2779 , 291-303
Key Words:
Side-Channel Attacks, Timing Attacks, GPS, Identification Schemes
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2779/27790291.htm


Inproceedings [ CoronTchulkine03 ]
Jean-Sébastian Coron and Alexei Tchulkine
A New Algorithm for Switching from Arithmetic to Boolean Masking
C. Walter and Ç. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag, 2003 , LNCS , 2779 , 89-97
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2779/27790089.htm


Inproceedings [ FouqueMartinetPoupard03 ]
Pierre-Alain Fouque and Gwenaëlle Martinet and Guillaume Poupard
Attacking Unbalanced RSA-CRT Using SPA
C. Walter and Ç. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag, 2003 , LNCS , 2779 , 254-268
Key Words:
Simple Power Analysis, RSA signature, factorization, LLL algorithm
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2779/27790254.htm


Inproceedings [ FouqueValette03 ]
Pierre-Alain Fouque and Frédéric Valette
The Doubling Attack - Why Upwards Is Better than Downwards
C. Walter and Ç. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag, 2003 , LNCS , 2779 , 269-280
Key Words:
SPA-based analysis, modular exponentiation, scalar multiplication, DPA countermeasures, multiple exponent single data attack
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2779/27790269.htm


Inproceedings [ FournierMooreLiMullinsTaylor03 ]
Jacques J.A. Fournier and Simon Moore and Huiyun Li and Robert Mullins and George Taylor
Security Evaluation of Asynchronous Circuits
C. Walter and Ç. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag, 2003 , LNCS , 2779 , 137-151
Key Words:
Asynchronous circuits, Dual-Rail encoding, Power Analysis, EMA, Fault Analysis, Design-time security evaluation
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2779/27790137.htm
Full Paper:
http://www.cl.cam.ac.uk/~hl264/publications/async_eval.pdf


Inproceedings [ Golic03 ]
Jovan D. Goliç
DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits
C. Walter and Ç. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag, 2003 , LNCS , 2779 , 98-112
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2779/27790098.htm


Inproceedings [ ItohIzuTakenaka03 ]
Kouichi Itoh and Tetsuya Izu and Masahiko Takenaka
A Practical Countermeasure against Address-Bit Differential Power Analysis
C. Walter and Ç. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag, 2003 , LNCS , 2779 , 382-396
Key Words:
Differential Power Analysis (DPA), address-bit DPA, countermeasure, exponentiation, RSA, ECC
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2779/27790382.htm


Inproceedings [ KarlofWagner03 ]
Chris Karlof and David Wagner
Hidden Markov Model Cryptanalysis
C. Walter and Ç. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag, 2003 , LNCS , 2779 , 17-34
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2779/27790017.htm
Full Paper:
http://www.cs.berkeley.edu/~ckarlof/papers/hmm-tech-rep.pdf


Inproceedings [ OersOswaldPreneel03 ]
Siddika Berna Örs and Elisabeth Oswald and Bart Preneel
Power-Analysis Attacks on an FPGA - First Experimental Results
C. Walter and Ç. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag, 2003 , LNCS , 2779 , 35-50
Key Words:
FPGA, Power Analysis, Elliptic Curve Cryptosystems
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2779/27790035.htm
Full Paper:
http://www.iaik.tugraz.at/research/sca-lab/publications/pdf/Ors2003Power-AnalysisAttackson.pdf


Inproceedings [ OkeyaTakagi03 ]
Katsuyuki Okeya and Tsuyoshi Takagi
A More Flexible Countermeasure against Side Channel Attacks Using Window Method
C. Walter and Ç. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag, 2003 , LNCS , 2779 , 397-410
Key Words:
Elliptic Curve Cryptosystem, Side Channel Attacks, Width-w NAF, Fractional window, Pre-computation Table, Smart Card, Memory Constraint
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2779/27790397.htm


Inproceedings [ PiretQuisquater03 ]
Gilles Piret and Jean-Jacques Quisquater
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD
C. Walter and Ç. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag, 2003 , LNCS , 2779 , 77-88
Key Words:
AES, Block Ciphers, Fault Attacks, Side-channel Attacks
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2779/27790077.htm


Inproceedings [ Smart03 ]
Nigel P. Smart
An Analysis of Goubin's Refined Power Analysis Attack
C. Walter and Ç. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag, 2003 , LNCS , 2779 , 281-290
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2779/27790281.htm


Inproceedings [ TiriVerbauwhede03 ]
Kris Tiri and Ingrid Verbauwhede
Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology
C. Walter and Ç. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag, 2003 , LNCS , 2779 , 125-136
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2779/27790125.htm


Inproceedings [ TsunooSaitoSuzakiShigeriMiyauchi03 ]
Yukiyasu Tsunoo and Teruo Saito and Tomoyasu Suzaki and Maki Shigeri and Hiroshi Miyauchi
Cryptanalysis of DES Implemented on Computers with Cache
C. Walter and Ç. Koç and C. Paar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag, 2003 , LNCS , 2779 , 62-76
Key Words:
DES, AES, Camellia, cache, side-channel, timing attacks
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2779/27790062.htm


Inproceedings [ Novak03 ]
Roman Novak
Side-Channel Attack on Substitution Blocks
J. Zhou, M. Yung, Y. Han (ed.), Applied Cryptography and Network Security -- ACNS 2003, Springer-Verlag, 2003 , LNCS , 2846 , 307-318
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2846/28460307.htm


Inproceedings [ AkkarGoubin03 ]
Mehdi-Laurent Akkar and Louis Goubin
A Generic Protection against High-Order Differential Power Analysis
Thomas Johansson (ed.), Fast Software Encryption, 10th International Workshop, FSE 2003, Springer-Verlag, 2003 , LNCS , 2887 , 192-205
Key Words:
Smart-cards, DES, Power analysis, High-Order DPA
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2887/28870192.htm


Inproceedings [ SchrammWollingerPaar03 ]
Kai Schramm and Thomas Wollinger and Christof Paar
A New Class of Collision Attacks and Its Application to DES
Thomas Johansson (ed.), Fast Software Encryption, 10th International Workshop, FSE 2003, Springer-Verlag, 2003 , LNCS , 2887 , 206-222
Key Words:
DES, S-Boxes, collision attack, internal collisions, power analysis, side channel attacks
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2887/28870206.htm
Full Paper:
DES COLLISION ATTACK


Inproceedings [ SchindlerWalter2003 ]
Werner Schindler, Colin D. Walter
More Detail for a Combined Timing and Power Attack against Implementations of RSA
K. G. Paterson (ed.), Cryptography and Coding 2003, Springer-Verlag, 2003 , LNCS , 2898 , 245-263
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2898/28980245.htm


Inproceedings [ Novak03a ]
Roman Novak
Sign-Based Differential Power Analysis
K. Chae and M. Yung (ed.), Information Security Applications, 4th International Workshop, WISA 2003, Springer-Verlag, 2003 , LNCS , 2908 , 203-216
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2908/29080203.htm


Inproceedings [ Mangard2003 ]
Stefan Mangard
Exploiting Radiated Emissions EM Attacks on Cryptographic ICs
Timm Ostermann and Christoph Lackner (ed.), Austrochip 2003, Linz, Austria, October 1st, 2003, Proceedings, 2003 , 13-16
Full Paper:
http://www.iaik.tugraz.at/research/sca-lab/publications/pdf/Mangard2003ExploitingRadiatedEmissions.pdf


Inproceedings [ BatinaBruin-MucommentingOers04 ]
Lejla Batina and Geeke Bruin-Mucommenting and Siddika Berna Örs
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems
Tatsuaki Okamoto (ed.), Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, Springer-Verlag, 2004 , LNCS , 2964 , 250-263
Key Words:
FPGA design, Systolic array, Hardware implementation, RSA, ECC, Montgomery multiplication, Side-channel attacks
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2964/29640250.htm


Inproceedings [ Chevallier-Mames04 ]
Benoît Chevallier-Mames
Self-Randomized Exponentiation Algorithms
Tatsuaki Okamoto (ed.), Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, Springer-Verlag, 2004 , LNCS , 2964 , 236-249
Key Words:
Exponentiation, implementation attacks, fault attacks, side-channel attacks (DPA, SPA), randomization, exponent masking, blinding, RSA, standard mode, smart cards
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2964/29640236.htm
Full Paper:
http://www.gemplus.com/smart/rd/publications/pdf/Che04sel.pdf


Inproceedings [ Mangard04 ]
Stefan Mangard
Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness
Tatsuaki Okamoto (ed.), Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, Springer-Verlag, 2004 , LNCS , 2964 , 222-235
Key Words:
Smart cards, Side-Channel Attacks, Differential Power analysis (DPA), Hardware countermeasures
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2964/29640222.htm
Full Paper:
http://www.iaik.tugraz.at/research/sca-lab/publications/pdf/Mangard2004HardwareCountermeasuresagainst.pdf


Inproceedings [ Walter04CTRSA ]
Colin D. Walter
Issues of Security with the Oswald-Aigner Exponentiation Algorithm
Tatsuaki Okamoto (ed.), Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, Springer-Verlag, 2004 , LNCS , 2964 , 208-221
Key Words:
Addition-subtraction chains, randomized exponentiation, elliptic curve cryptography, ECC, point multiplication, power analysis, SPA, DPA, SEMA, DEMA, blinding, smartcard
Abstract:
http://link.springer.de/link/service/series/0558/bibs/2964/29640208.htm
Full Paper:
http://www.comodogroup.com/research/crypto/CDW_RSA_2004.ps


Inproceedings [ AkkarBevanGoubin04 ]
Mehdi-Laurent Akkar and Régis Beván and Louis Goubin
Two Power Analysis Attacks against One-Mask Methods
Bimal K. Roy and Willi Meier (ed.), Fast Software Encryption, 11th International Workshop, FSE 2004, Springer-Verlag, 2004 , LNCS , 3017 , 332-347
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3017/30170332.htm


Inproceedings [ BajardImbertLiardetTeglia04 ]
Jean-Claude Bajard and Laurent Imbert and Pierre-Yvan Liardet and Yannick Teglia
Leak Resistant Arithmetic
M. Joye and J.-J. Quisquater (ed.), Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, 2004 , LNCS , 3156 , 62-75
Key Words:
Side channel attacks, residue number systems, RNS Montgomery multiplication
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3156/31560062.htm


Inproceedings [ BrierClavierOlivier04 ]
Eric Brier and Christophe Clavier and Francis Olivier
Correlation Power Analysis with a Leakage Model
M. Joye and J.-J. Quisquater (ed.), Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, 2004 , LNCS , 3156 , 16-29
Key Words:
Correlation factor, CPA, DPA, Hamming distance, power analysis, DES, AES, secure cryptographic device, side channel
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3156/31560016.htm


Inproceedings [ FouqueMullerPoupardValette04 ]
Pierre-Alain Fouque and Frédéric Muller and Guillaume Poupard and Frédéric Valette
Defeating Countermeasures Based on Randomized BSD Representations
M. Joye and J.-J. Quisquater (ed.), Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, 2004 , LNCS , 3156 , 312-327
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3156/31560312.htm


Inproceedings [ LedigMullerValette04 ]
Hervé Ledig and Frédéric Muller and Frédéric Valette
Enhancing Collision Attacks
M. Joye and J.-J. Quisquater (ed.), Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, 2004 , LNCS , 3156 , 176-190
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3156/31560176.htm


Inproceedings [ LemkeSchrammPaar04 ]
Kerstin Lemke and Kai Schramm and Christof Paar
DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction
M. Joye and J.-J. Quisquater (ed.), Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, 2004 , LNCS , 3156 , 205-219
Key Words:
DPA, Boolean and arithmetic operations, IDEA, RC6, HMAC-construction
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3156/31560205.htm


Inproceedings [ MamiyaMiyajiMorimoto04 ]
Hideyo Mamiya and Atsuko Miyaji and Hiroaki Morimoto
Efficient Countermeasures against RPA, DPA, and SPA
M. Joye and J.-J. Quisquater (ed.), Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, 2004 , LNCS , 3156 , 343-356
Key Words:
Elliptic curve exponentiation, ZPA, RPA, DPA, SPA
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3156/31560343.htm


Inproceedings [ Mishra04 ]
Pradeep Kumar Mishra
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems
M. Joye and J.-J. Quisquater (ed.), Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, 2004 , LNCS , 3156 , 328-342
Key Words:
Elliptic curve cryptosystems, pipelining, scalar multiplication, Jacobian coordinates
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3156/31560328.htm


Inproceedings [ NeissePulkus04 ]
Olaf Neiße and Jürgen Pulkus
Switching Blindings with a View Towards IDEA
M. Joye and J.-J. Quisquater (ed.), Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, 2004 , LNCS , 3156 , 230-239
Key Words:
DPA, IDEA, MD5, Masking Techniques, RC6, SHA-1
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3156/31560230.htm


Inproceedings [ Olson04 ]
Loren D. Olson
Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve
M. Joye and J.-J. Quisquater (ed.), Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, 2004 , LNCS , 3156 , 220-229
Key Words:
Elliptic curves, ECC, cryptography, side-channel attacks, weighted projective curves, uniform addition formula
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3156/31560220.htm


Inproceedings [ SakaiSakurai04 ]
Yasuyuki Sakai and Kouichi Sakurai
A New Attack with Side Channel Leakage During Exponent Recoding Computations
M. Joye and J.-J. Quisquater (ed.), Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, 2004 , LNCS , 3156 , 298-311
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3156/31560298.htm


Inproceedings [ SchrammLeanderFelkePaar04 ]
Kai Schramm and Gregor Leander and Patrick Felke and Christof Paar
A Collision-Attack on AES Combining Side Channel- and Differential-Attack
M. Joye and J.-J. Quisquater (ed.), Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, 2004 , LNCS , 3156 , 163-175
Key Words:
AES, side channel attacks, internal collisions, birthday paradox
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3156/31560163.htm


Inproceedings [ SokolovMurphyBystrovYakolev04 ]
Danil Sokolov and Julian Murphy and Alex Bystrov and Alex Yakovlev
Improving the Security of Dual-Rail Circuits
M. Joye and J.-J. Quisquater (ed.), Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, 2004 , LNCS , 3156 , 282-297
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3156/31560282.htm


Inproceedings [ StandaertOersPreneel04 ]
François-Xavier Standaert and Siddika Berna Örs and Bart Preneel
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
M. Joye and J.-J. Quisquater (ed.), Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, 2004 , LNCS , 3156 , 30-44
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3156/31560030.htm


Inproceedings [ WaddleWagner04 ]
Jason Waddle and David Wagner
Towards Efficient Second-Order Power Analysis
M. Joye and J.-J. Quisquater (ed.), Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, 2004 , LNCS , 3156 , 1-15
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3156/31560001.htm


Inproceedings [ Walter04 ]
Colin D. Walter
Simple Power Analysis of Unified Code for ECC Double and Add
M. Joye and J.-J. Quisquater (ed.), Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag, 2004 , LNCS , 3156 , 191-204
Key Words:
Side channel leakage, simple power analysis, SPA, elliptic curve cryptography, ECC, unified code, Montgomery modular multiplication
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3156/31560191.htm
Full Paper:
http://www.comodogroup.com/research/crypto/CDW_CHES_2004.ps


Inproceedings [ RechbergerOswald04 ]
Christian Rechberger and Elisabeth Oswald
Practical Template Attacks
Chae Hoon Lim and Moti Yung (ed.), Information Security Applications, 5th International Workshop, WISA 2004, Springer, 2004 , Lecture Notes in Computer Science , 3325 , 443-457
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3325/33250443.htm
Full Paper:
http://www.iaik.tugraz.at/research/sca-lab/publications/pdf/Rechberger2004PracticalTemplateAttacks.pdf


Inproceedings [ YenChenMoonHa04 ]
Sung-Ming Yen and Chien-Ning Chen and Sang-Jae Moon and JaeCheol Ha
Improvement on Ha-Moon Randomized Exponentiation Algorithm.
Choonsik Park and Seongtaek Chee (ed.), Information Security and Cryptology - ICISC 2004, Springer, 2004 , LNCS , 3506 , 154-167
Key Words:
Differential power analysis (DPA), Modular exponentiation, Physical cryptanalysis, Randomized recoding, Side-channel attack, Signed-digit recoding, Simple power analysis (SPA).
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3506/35060154.htm


Inproceedings [ OersGuerkaynakOswald04 ]
Siddika Berna Örs and Frank Gürkaynak and Elisabeth Oswald and Bart Preneel
Power-Analysis Attack on an ASIC AES implementation
Proceedings of the International Conference on Information Technology (ITCC), 2004
Full Paper:
http://www.iaik.tugraz.at/research/sca-lab/publications/pdf/Ors2004Power-AnalysisAttackon.pdf


Inproceedings [ MangardPoppGammel05 ]
Stefan Mangard and Thomas Popp and Berndt M. Gammel
Side-Channel Leakage of Masked CMOS Gates.
Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, Springer, 2005 , LNCS , 3376 , 351-365
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3376/33760351.htm
Full Paper:
http://www.matpack.de/personal/Mangard_Popp_Gammel_CTRSA2005.pdf


Inproceedings [ Schindler05 ]
Werner Schindler
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods.
Serge Vaudenay (ed.), Public Key Cryptography, Springer, 2005 , LNCS , 3386 , 85-103
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3386/33860085.htm


Inproceedings [ OswaldMangardPramstallerRijmen05 ]
Elisabeth Oswald and Stefan Mangard and Norbert Pramstaller and Vincent Rijmen
A Side-Channel Analysis Resistant Description of the AES S-Box.
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers, Springer, 2005 , LNCS , 3557 , 413-423
Key Words:
AES, side-channel analysis, masking schemes.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3557/35570413.htm
Full Paper:
http://www.iaik.tugraz.at/research/sca-lab/publications/pdf/Oswald2005ASide-ChannelAnalysis.pdf


Inproceedings [ Prouff05 ]
Emmanuel Prouff
DPA Attacks and S-Boxes.
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers, Springer, 2005 , LNCS , 3557 , 424-441
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3557/35570424.htm


Inproceedings [ AgrawalRaoRohatgiSchramm05 ]
Dakshi Agrawal and Josyula R. Rao and Pankaj Rohatgi and Kai Schramm
Templates as Master Keys.
Josyula R. Rao and Berk Sunar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2005, Springer, 2005 , LNCS , 3659 , 15-29
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3659/36590015.htm
Full Paper:
http://www.research.ibm.com/people/a/agrawal/publications/CHES2005.pdf


Inproceedings [ DupuyKunz-Jacques05 ]
William Dupuy and Sébastien Kunz-Jacques
Resistance of Randomized Projective Coordinates Against Power Analysis.
Josyula R. Rao and Berk Sunar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2005, Springer, 2005 , LNCS , 3659 , 1-14
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3659/36590001.htm


Inproceedings [ FischerGammel05 ]
Wieland Fischer and Berndt M. Gammel
Masking at Gate Level in the Presence of Glitches.
Josyula R. Rao and Berk Sunar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2005, Springer, 2005 , LNCS , 3659 , 187-200
Key Words:
Cryptanalysis, side-channel attacks, power analysis, DPA, digital circuits, logic circuits, masking, random masking, masked logic circuits, glitches.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3659/36590187.htm
Full Paper:
http://www.matpack.de/personal/Fischer_Gammel_Masking_at_Gate_Level_CHES05.pdf


Inproceedings [ GebotysHoTiu05 ]
Catherine H. Gebotys and Simon Ho and C. C. Tiu
EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA.
Josyula R. Rao and Berk Sunar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2005, Springer, 2005 , LNCS , 3659 , 250-264
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3659/36590250.htm
Full Paper:
http://www.cacr.math.uwaterloo.ca/techreports/2005/cacr2005-13.pdf


Inproceedings [ GuilleyHoogvorstMathieuPacalet05 ]
Sylvain Guilley and Philippe Hoogvorst and Yves Mathieu and Renaud Pacalet
The "Backend Duplication" Method.
Josyula R. Rao and Berk Sunar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2005, Springer, 2005 , LNCS , 3659 , 383-397
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3659/36590383.htm


Inproceedings [ JoyePaillierSchoenmakers05 ]
Marc Joye and Pascal Paillier and Berry Schoenmakers
On Second-Order Differential Power Analysis.
Josyula R. Rao and Berk Sunar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2005, Springer, 2005 , LNCS , 3659 , 293-308
Key Words:
Side-channel analysis, differential power analysis, second-order attacks.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3659/36590293.htm
Full Paper:
http://www.win.tue.nl/~berry/papers/ches05hodpa.pdf


Inproceedings [ Kuhn05 ]
Markus G. Kuhn
Security Limits for Compromising Emanations.
Josyula R. Rao and Berk Sunar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2005, Springer, 2005 , LNCS , 3659 , 265-279
Key Words:
Eavesdropping, emission security, Tempest, protection standards, video displays, side channels.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3659/36590265.htm
Full Paper:
http://www.cl.cam.ac.uk/~mgk25/ches2005-limits.pdf


Inproceedings [ LiMarkettosMoore05 ]
Huiyun Li and A. Theodore Markettos and Simon W. Moore
Security Evaluation Against Electromagnetic Analysis at Design Time.
Josyula R. Rao and Berk Sunar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2005, Springer, 2005 , LNCS , 3659 , 280-292
Key Words:
EM side-channel analysis; smart card; design time security evaluation.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3659/36590280.htm
Full Paper:
http://www.cl.cam.ac.uk/~hl264/publications/EMsim_CHES.pdf


Inproceedings [ MangardPramstallerOswald05 ]
Stefan Mangard and Norbert Pramstaller and Elisabeth Oswald
Successfully Attacking Masked AES Hardware Implementations.
Josyula R. Rao and Berk Sunar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2005, Springer, 2005 , LNCS , 3659 , 157-171
Key Words:
AES, ASIC, DPA, Masking, Power Analysis.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3659/36590157.htm
Full Paper:
http://www.iaik.tugraz.at/research/sca-lab/publications/pdf/Mangard2005SuccessfullyAttackingMasked.pdf


Inproceedings [ PeetersStandaertDonckersQuisquater05 ]
Eric Peeters and François-Xavier Standaert and Nicolas Donckers and Jean-Jacques Quisquater
Improved Higher-Order Side-Channel Attacks with FPGA Experiments.
Josyula R. Rao and Berk Sunar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2005, Springer, 2005 , LNCS , 3659 , 309-323
Key Words:
cryptographic devices, side-channel analysis, DPA, high-order power analysis, masking countermeasure, block cipher, FPGA.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3659/36590309.htm


Inproceedings [ PoppMangard05 ]
Thomas Popp and Stefan Mangard
Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints.
Josyula R. Rao and Berk Sunar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2005, Springer, 2005 , LNCS , 3659 , 172-186
Key Words:
Side-Channel Analysis, DPA, Hardware Countermeasures, MDPL, Masking Logic, Dual-Rail Pre-Charge Logic.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3659/36590172.htm
Full Paper:
http://www.iaik.tugraz.at/research/sca-lab/publications/pdf/Popp2005MaskedDual-RailPre-Charge.pdf


Inproceedings [ SchindlerLemkePaar05 ]
Werner Schindler and Kerstin Lemke and Christof Paar
A Stochastic Model for Differential Side Channel Cryptanalysis.
Josyula R. Rao and Berk Sunar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2005, Springer, 2005 , LNCS , 3659 , 30-46
Key Words:
Differential Side Channel Cryptanalysis, Stochastic Model, Minimum Principle, Maximum Likelihood Principle, Power Analysis, DPA, Electromagnetic Analysis, DEMA, Template Attack.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3659/36590030.htm
Full Paper:
ches2005_final_v12.pdf


Inproceedings [ SuzukiSaekiIchikawa05 ]
Daisuke Suzuki and Minoru Saeki and Tetsuya Ichikawa
DPA Leakage Models for CMOS Logic Circuits.
Josyula R. Rao and Berk Sunar (ed.), Cryptographic Hardware and Embedded Systems - CHES 2005, Springer, 2005 , LNCS , 3659 , 366-382
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3659/36590366.htm


Inproceedings [ YenLienMoonHa05 ]
Sung-Ming Yen and Wei-Chih Lien and Sang-Jae Moon and JaeCheol Ha
Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption.
Ed Dawson and Serge Vaudenay (ed.), Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, Springer, 2005 , LNCS , 3715 , 183-195
Key Words:
Chosen-message attack, Cryptography, Side-channel attack, Simple power analysis (SPA), Smart card.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3715/37150183.htm


Inproceedings [ MukhopadhyayBanerjeeRoyChowdhuryBhattacharya05 ]
D. Mukhopadhyay and S. Banerjee and D. RoyChowdhury and B. B. Bhattacharya
CryptoScan: A Secured Scan Chain Architecture
ATS '05: Proceedings of the 14th Asian Test Symposium on Asian Test Symposium, IEEE Computer Society, 2005 , 348-353
Abstract:
http://dx.doi.org/10.1109/ATS.2005.42
Full Paper:
http://www.cs.iitm.ernet.in/~debdeep/papers/cryptoscan.pdf


Inproceedings [ Oswald2006AnEfficientMasking ]
Elisabeth Oswald and Kai Schramm
An Efficient Masking Scheme for AES Software Implementations
Jooseok Song and Taekyoung Kwon and Moti Yung (ed.), Information Security Applications, 6th International Workshop, WISA 2005, Springer, 2006 , LNCS , 3786 , 292-305
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3786/37860292.htm
Full Paper:
http://www.iaik.tugraz.at/research/sca-lab/publications/pdf/Oswald2006AnEfficientMasking.pdf


Inproceedings [ OsvikShamirTromer06 ]
Dag Arne Osvik and Adi Shamir and Eran Tromer
Cache Attacks and Countermeasures: The Case of AES.
David Pointcheval (ed.), Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, 2006 , LNCS , 3860 , 1-20
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3860/38600001.htm


Inproceedings [ OswaldMangardHerbstTilich06 ]
Elisabeth Oswald and Stefan Mangard and Christoph Herbst and Stefan Tillich
Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers.
David Pointcheval (ed.), Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, Springer, 2006 , LNCS , 3860 , 192-207
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3860/38600192.htm
Full Paper:
http://www.iaik.tugraz.at/research/sca-lab/publications/pdf/Oswald2006PracticalSecond-OrderDPA.pdf


Inproceedings [ SchrammPaar06 ]
Kai Schramm and Christof Paar
Higher Order Masking of the AES.
David Pointcheval (ed.), Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, Springer, 2006 , LNCS , 3860 , 208-225
Key Words:
AES, Higher Order DPA, Masking Countermeasure.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3860/38600208.htm
Full Paper:
higher_order_masking_of_aes.ps


Inproceedings [ HerbstOswaldMangard2006 ]
Christoph Herbst and Elisabeth Oswald and Stefan Mangard
An AES Smart Card Implementation Resistant to Power Analysis Attacks
Jianying Zhou and Moti Yung and Feng Bao (ed.), Applied Cryptography and Network Security -- ACNS 2006, Springer, 2006 , LNCS , 3989 , 239-252
Key Words:
AES, smart card, DPA resistance.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/3989/39890239.htm
Full Paper:
http://www.iaik.tugraz.at/research/sca-lab/publications/pdf/Herbst2006AESSmartcardImplementation.pdf


Inproceedings [ AkishitaKatagiKitamura06 ]
Toru Akishita and Masanobu Katagi and Izuru Kitamura
SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form.
Louis Goubin and Mitsuru Matsui (ed.), Cryptographic Hardware and Embedded Systems - CHES 2006, 2006 , LNCS , 4249 , 148-159
Key Words:
hyperelliptic curve cryptosystems, scalar multiplication, theta divisor, signed binary representation, simple power analysis.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/4249/42490148.htm


Inproceedings [ ArchambeauPeetersStandaertQuisquater06 ]
Cédric Archambeau and Eric Peeters and François-Xavier Standaert and Jean-Jacques Quisquater
Template Attacks in Principal Subspaces.
Louis Goubin and Mitsuru Matsui (ed.), Cryptographic Hardware and Embedded Systems - CHES 2006, Springer, 2006 , LNCS , 4249 , 1-14
Abstract:
http://link.springer.de/link/service/series/0558/bibs/4249/42490001.htm
Full Paper:
http://www.cs.ucl.ac.uk/staff/C.Archambeau/publ/ches_ca06.pdf


Inproceedings [ BonneauMironov06 ]
Joseph Bonneau and Ilya Mironov
Cache-Collision Timing Attacks Against AES.
Louis Goubin and Mitsuru Matsui (ed.), Cryptographic Hardware and Embedded Systems - CHES 2006, 2006 , LNCS , 4249 , 201-215
Key Words:
AES, cryptanalysis, side-channel attack, timing attack, cache.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/4249/42490201.htm
Full Paper:
http://research.microsoft.com/users/mironov/papers/aes-timing.pdf


Inproceedings [ BouesseSicardRenaudin06 ]
G. Fraidy Bouesse and Gilles Sicard and Marc Renaudin
Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits.
Louis Goubin and Mitsuru Matsui (ed.), Cryptographic Hardware and Embedded Systems - CHES 2006, 2006 , LNCS , 4249 , 384-398
Key Words:
QDI Asynchronous circuits, Power analysis, Path Swapping (PS).
Abstract:
http://link.springer.de/link/service/series/0558/bibs/4249/42490384.htm


Inproceedings [ BucciGiancaneLuzziTrifiletti06 ]
Marco Bucci and Luca Giancane and Raimondo Luzzi and Alessandro Trifiletti
Three-Phase Dual-Rail Pre-charge Logic.
Louis Goubin and Mitsuru Matsui (ed.), Cryptographic Hardware and Embedded Systems - CHES 2006, 2006 , LNCS , 4249 , 232-241
Key Words:
DPA, dual-rail logic, SABL, security.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/4249/42490232.htm


Inproceedings [ ChenZhou06 ]
Zhimin Chen and Yujie Zhou
Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage.
Louis Goubin and Mitsuru Matsui (ed.), Cryptographic Hardware and Embedded Systems - CHES 2006, 2006 , LNCS , 4249 , 242-254
Key Words:
Side Channel Attacks, DPA, Gate Level Masking, DRSL, Dual-Rail, Pre-charge
Abstract:
http://link.springer.de/link/service/series/0558/bibs/4249/42490242.htm


Inproceedings [ FouqueKunzJacquesMartinetMullerValette06 ]
Pierre-Alain Fouque and Sébastien Kunz-Jacques and Gwenaëlle Martinet and Frédéric Muller and Frédéric Valette
Power Attack on Small RSA Public Exponent.
Louis Goubin and Mitsuru Matsui (ed.), Cryptographic Hardware and Embedded Systems - CHES 2006, 2006 , LNCS , 4249 , 339-353
Key Words:
RSA cryptosystem, sliding window methods, exponent randomization, Simple Power Analysis.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/4249/42490339.htm
Full Paper:
http://www.di.ens.fr/~fouque/pub/ches06.pdf


Inproceedings [ GierlichsLemkePaar06 ]
Benedikt Gierlichs and Kerstin Lemke-Rust and Christof Paar
Templates vs. Stochastic Methods.
Louis Goubin and Mitsuru Matsui (ed.), Cryptographic Hardware and Embedded Systems - CHES 2006, Springer, 2006 , LNCS , 4249 , 15-29
Key Words:
Template Attack, Stochastic Model, Performance Analysis, Side Channel Cryptanalysis, High-Order Attacks, Power Analysis.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/4249/42490015.htm
Full Paper:
ches2006v15.pdf


Inproceedings [ HommaNagashimaImaiAokiSatoh06 ]
Naofumi Homma and Sei Nagashima and Yuichi Imai and Takafumi Aoki and Akashi Satoh
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching.
Louis Goubin and Mitsuru Matsui (ed.), Cryptographic Hardware and Embedded Systems - CHES 2006, 2006 , LNCS , 4249 , 187-200
Key Words:
side-channel attacks, DPA, DEMA, cryptographic module, waveform matching, phase-only correlation.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/4249/42490187.htm
Full Paper:
http://www.aoki.ecei.tohoku.ac.jp/crypto/pdf/CHES2006.pdf


Inproceedings [ KulikowskiSmirnovTaubin06 ]
Konrad J. Kulikowski and Alexander Smirnov and Alexander Taubin
Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks.
Louis Goubin and Mitsuru Matsui (ed.), Cryptographic Hardware and Embedded Systems - CHES 2006, 2006 , LNCS , 4249 , 399-413
Abstract:
http://link.springer.de/link/service/series/0558/bibs/4249/42490399.htm
Full Paper:
http://async.bu.edu/publications/ches06.pdf


Inproceedings [ LeClediereCanovasRobissonServiereLacoume06 ]
Thanh-Ha Le and Jessy Clédière and Cécile Canovas and Bruno Robisson and Christine Servière and Jean-Louis Lacoume
A Proposition for Correlation Power Analysis Enhancement.
Louis Goubin and Mitsuru Matsui (ed.), Cryptographic Hardware and Embedded Systems - CHES 2006, 2006 , LNCS , 4249 , 174-186
Key Words:
side channel, power analysis, DPA, multi-bit DPA, PPA, CPA, correlation, DES, AES.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/4249/42490174.htm


Inproceedings [ MangardSchramm06 ]
Stefan Mangard and Kai Schramm
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations.
Louis Goubin and Mitsuru Matsui (ed.), Cryptographic Hardware and Embedded Systems - CHES 2006, Springer, 2006 , LNCS , 4249 , 76-90
Key Words:
AES, DPA, Glitches, Zero-Offset DPA, Zero-Input DPA, Masking, Delay Chains.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/4249/42490076.htm
Full Paper:
/media/crypto/attachments/files/2010/05//imperia/md/content/texte/publications/conferences/
pinpointing_the_side_channel_leakage_of_masked_aes_hardware_implementations


Inproceedings [ ProuffGiraudAumonier06 ]
Emmanuel Prouff and Christophe Giraud and Sébastien Aumônier
Provably Secure S-Box Implementation Based on Fourier Transform.
Louis Goubin and Mitsuru Matsui (ed.), Cryptographic Hardware and Embedded Systems - CHES 2006, 2006 , LNCS , 4249 , 216-230
Key Words:
Differential Power Analysis, Provably Secure Countermeasure, Fourier Transform, Symmetric Cryptosystems, S-Box, AES, FOX.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/4249/42490216.htm


Inproceedings [ StandaertPeetersArchambeauQuisquater06 ]
François-Xavier Standaert and Eric Peeters and Cédric Archambeau and Jean-Jacques Quisquater
Towards Security Limits in Side-Channel Attacks.
Louis Goubin and Mitsuru Matsui (ed.), Cryptographic Hardware and Embedded Systems - CHES 2006, 2006 , LNCS , 4249 , 30-45
Abstract:
http://link.springer.de/link/service/series/0558/bibs/4249/42490030.htm
Full Paper:
http://www.dice.ucl.ac.be/~fstandae/tsca/2.pdf


Inproceedings [ StebilaTheriault06 ]
Douglas Stebila and Nicolas Thériault
Unified Point Addition Formul} and Side-Channel Attacks.
Louis Goubin and Mitsuru Matsui (ed.), Cryptographic Hardware and Embedded Systems - CHES 2006, 2006 , LNCS , 4249 , 354-368
Key Words:
elliptic-curve cryptography, side-channel attacks, unified point addition formulæ, projective coordinates.
Abstract:
http://link.springer.de/link/service/series/0558/bibs/4249/42490354.htm
Full Paper:
http://www.douglas.stebila.ca/files/research/papers/ST06.pdf


Inproceedings [ SuzukiSaeki06 ]
Daisuke Suzuki and Minoru Saeki
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style.
Louis Goubin and Mitsuru Matsui (ed.), Cryptographic Hardware and Embedded Systems - CHES 2006, 2006 , LNCS , 4249 , 255-269
Abstract:
http://link.springer.de/link/service/series/0558/bibs/4249/42490255.htm


Inproceedings [ JouxDelaunay06 ]
Antoine Joux and Pascal Delaunay
Galois LFSR, Embedded Devices and Side Channel Weaknesses.
Rana Barua and Tanja Lange (ed.), Progress in Cryptology - INDOCRYPT 2006, Springer, 2006 , LNCS , 4329 , 436-451
Abstract:
http://link.springer.de/link/service/series/0558/bibs/4329/43290436.htm


Inproceedings [ PoppMangard2006 ]
Thomas Popp and Stefan Mangard
Implementation Aspects of the DPA-Resistant Logic Style MDPL
International Symposium on Circuits and Systems (ISCAS 2006), Island of Kos, Greece, May 21 - 24, 2006, Proceedings, IEEE Computer Society, 2006 , 2913-2916
Full Paper:
http://www.iaik.tugraz.at/research/sca-lab/publications/pdf/Popp2006ImplementationAspectsof.pdf


Misc [ OswaldAigner2000 ]
Elisabeth Oswald and Manfred Aigner
Power Analysis Tutorial
2000
Full Paper:
http://www.iaik.tugraz.at/aboutus/people/oswald/papers/dpa_tutorial.pdf


Misc [ Bellezza01 ]
Antonio Bellezza
Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems
Cryptology ePrint Archive, 2001
Full Paper:
http://eprint.iacr.org/2001/103.pdf


Misc [ RaoRohatgi2001 ]
Josyula R. Rao and Pankaj Rohatgi
EMpowering Side-Channel Attacks
Cryptology ePrint Archive, 2001
Full Paper:
http://eprint.iacr.org/2001/037.pdf


Misc [ BilletJoye02 ]
Olivier Billet and Marc Joye
The Jacobi Model of an Elliptic Curve and Side-Channel Analysis
Cryptology ePrint Archive, 2002
Key Words:
implementation / Elliptic curve cryptosystems, side-channel analysis
Full Paper:
http://eprint.iacr.org/2002/125.pdf


Misc [ FischerGiraudKnudsenSeifert02a ]
Wieland Fischer and Christophe Giraud and Erik Woodward Knudsen and Jean-Pierre Seifert
Parallel scalar multiplication on general elliptic curves over $F_p$ hedged against Non-Differential Side-Channel Attacks
Cryptology ePrint Archive, 2002
Full Paper:
http://eprint.iacr.org/2002/007.pdf


Misc [ Golic ]
Jovan Dj. Goli
Multiplicative Masking and Power Analysis of AES
Cryptology ePrint Archive, 2002
Key Words:
secret-key cryptography / AES, differential power analysis, countermeasures, multiplicative masking
Full Paper:
http://eprint.iacr.org/2002/091.ps


Misc [ KlimaRosa02a ]
Vlastimil Klima and Tomas Rosa
Further Results and Considerations on Side Channel Attacks on RSA
Cryptology ePrint Archive, 2002
Key Words:
public-key cryptography / side channel attack, confirmation oracle, RSA-KEM, RSAES-OAEP, PKCS1 v.1.5, PKCS1 v.2.1, Bleichenbacher's attack, Manger's attack, power analysis, fault analysis
Full Paper:
http://eprint.iacr.org/2002/071.pdf


Misc [ Page02 ]
D. Page
Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel
Cryptology ePrint Archive, 2002
Key Words:
DES, cache memory, side channel analysis, smart cards, cryptanalysis
Full Paper:
http://eprint.iacr.org/2002/169.pdf


Misc [ BrierClavierOlivier03 ]
Eric Brier and Christophe Clavier and Francis Olivier
Optimal Statistical Power Analysis
Cryptology ePrint Archive, 2003
Key Words:
secret-key cryptography / Correlation factor, CPA, DPA, Hamming distance, power analysis, DES
Full Paper:
http://eprint.iacr.org/2003/152.pdf


Misc [ Chevallier-MamesCietJoye03a ]
Benoit Chevallier-Mames and Mathieu Ciet and Marc Joye
Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity
Cryptology ePrint Archive, 2003
Key Words:
implementation / Cryptographic algorithms, side-channel analysis, protected implementations, atomicity, exponentiation, elliptic curves
Full Paper:
http://eprint.iacr.org/2003/237.pdf


Misc [ KatagiKitamuraAkishitaTakagi03 ]
Masanobu Katagi and Izuru Kitamura and Toru Akishita and Tsuyoshi Takagi
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors
Cryptology ePrint Archive, 2003
Key Words:
hyperelliptic curve cryptosystem, scalar multiplication, timing attack, degenerate divisor, efficient computation
Full Paper:
http://eprint.iacr.org/2003/203.pdf


Misc [ MicaliReyzin03 ]
Silvio Micali and Leonid Reyzin
Physically Observable Cryptography
Cryptology ePrint Archive, 2003
Key Words:
foundations
Full Paper:
http://eprint.iacr.org/2003/120.pdf


Misc [ Trichina03 ]
Elena Trichina
Combinational Logic Design for AES SubByte Transformation on Masked Data
Cryptology ePrint Archive, 2003
Key Words:
implementation / AES, side channel analysis, data masking, inversion
Full Paper:
http://eprint.iacr.org/2003/236.pdf


Misc [ Walter03a ]
Colin D. Walter
Security Constraints on the Oswald-Aigner Exponentiation Algorithm
Cryptology ePrint Archive, 2003
Key Words:
public-key cryptography / power analysis attacks, elliptic curve cryptosystem
Full Paper:
http://eprint.iacr.org/2003/013.pdf


Misc [ BloemerMerchanKrummel04 ]
Johannes Blömer, Jorge Guajardo Merchan and Volker Krummel
Provably Secure Masking of AES
Cryptology ePrint Archive, 2004
Key Words:
secret-key cryptography / AES, side-channel attacks, provable secure countermeasures, DPA, hardware implementation, security model
Full Paper:
http://eprint.iacr.org/2004/101.pdf


Misc [ CarlierChabanneDottaxPelletier04 ]
Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax and Hervé Pelletier
Electromagnetic Side Channels of an FPGA Implementation of AES
Cryptology ePrint Archive, 2004
Key Words:
implementation / AES, side-channel attacks
Full Paper:
http://eprint.iacr.org/2004/145.pdf


Misc [ CietNevePeetersQuisquater04 ]
Mathieu Ciet and Michael Neve and Eric Peeters and Jean-Jacques Quisquater
Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided?
Cryptology ePrint Archive, 2004
Key Words:
public-key cryptography / RSA, Residue Numbers Systems, Side-Channels, SPA, DPA, EMA, Counter-measures, FPGA implementations
Full Paper:
http://eprint.iacr.org/2004/187.pdf


Misc [ Clavier04 ]
Christophe Clavier
Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm
Cryptology ePrint Archive, 2004
Key Words:
secret-key cryptography / GSM Authentication, A3/A8, Reverse Engineering, Substitution Table, Side Channel Analysis
Full Paper:
http://eprint.iacr.org/2004/049.pdf


Misc [ daFonseca04 ]
Filipe Rosado da-Fonseca
SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks
Cryptology ePrint Archive, 2004
Key Words:
implementation / Side channels, power-analysis, timing-analysis, electromagnetic-analysis, optical-analysis, smart cards, symmetric authentication, symmetric encryption, digital signature, asymmetric encryption, signcryption, pseudorandom permutations, pseudorandom functions, birthday attack.
Full Paper:
http://eprint.iacr.org/2004/369.pdf


Misc [ HanLimSakurai04 ]
Dong-Guk Han and Jongin Lim and Kouichi Sakurai
On security of XTR public key cryptosystems against Side Channel Attacks
Cryptology ePrint Archive, 2004
Key Words:
applications / XTR Public Key Cryptosystem, Side Channel Attacks, SPA, Data-bit DPA, Address-bit DPA, doubling attack
Full Paper:
http://eprint.iacr.org/2004/123.pdf


Misc [ HedabouPinelBeneteau04 ]
Mustapha Hedabou and Pierre Pinel and Lucien Bénéteau
A comb method to render ECC resistant against Side Channel Attacks
Cryptology ePrint Archive, 2004
Key Words:
implementation / ECC, SCA attacks, scalar multiplication
Full Paper:
http://eprint.iacr.org/2004/342.pdf


Misc [ OswaldMangardPramstaller04 ]
Elisabeth Oswald and Stefan Mangard and Norbert Pramstaller
Secure and Efficient Masking of AES - A Mission Impossible?
Cryptology ePrint Archive, 2004
Key Words:
implementation / AES, implementation, side channel attacks
Full Paper:
http://eprint.iacr.org/2004/134.pdf


Misc [ ParkLee04 ]
Dong Jin PARK and Pil Joong LEE
A DPA Attack on the Improved Ha-Moon Algorithm
Cryptology ePrint Archive, 2004
Key Words:
implementation / Ha-Moon algorithm, randomized exponentiation, side-channel attack
Full Paper:
http://eprint.iacr.org/2004/349.pdf


Misc [ SuzukiSaekiIchikawa04 ]
Daisuke Suzuki and Minoru Saeki and Tetsuya Ichikawa
Random Switching Logic: A Countermeasure against DPA based on Transition Probability
Cryptology ePrint Archive, 2004
Key Words:
implementation / side-channel attaks, CMOS, leakage model, transition probability
Full Paper:
http://eprint.iacr.org/2004/346.pdf


Misc [ TiriVerbauwhede04 ]
Kris Tiri and Ingrid Verbauwhede
A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC's.
Cryptology ePrint Archive, 2004
Key Words:
implementation / differential power analysis, smart cards, circuit styles
Full Paper:
http://eprint.iacr.org/2004/066.pdf


Misc [ TiriVerbauwhede04a ]
Kris Tiri and Ingrid Verbauwhede
Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC's against Differential Power Analysis
Cryptology ePrint Archive, 2004
Key Words:
implementation / differential power analysis, smart cards, circuit styles
Full Paper:
http://eprint.iacr.org/2004/067.pdf


Misc [ TiriVerbauwhede04b ]
Kris Tiri and Ingrid Verbauwhede
Synthesis of Secure FPGA Implementations
Cryptology ePrint Archive, 2004
Key Words:
implementation / differential power analysis, FPGA, synthese
Full Paper:
http://eprint.iacr.org/2004/068.pdf


Misc [ TrichinaKorkishko04 ]
E. Trichina and L. Korkishko
Secure and Efficient AES Software Implementation for Smart Cards
Cryptology ePrint Archive, 2004
Key Words:
implementation / AES, smart cards, power analysis attacks
Full Paper:
http://eprint.iacr.org/2004/149.pdf


Misc [ YangWuKarri04 ]
Bo Yang and Kaijie Wu and Ramesh Karri
Scan Based Side Channel Attack on Data Encryption Standard
Cryptology ePrint Archive, 2004
Key Words:
applications / DES, scan based test
Full Paper:
http://eprint.iacr.org/2004/083.pdf


Misc [ Avanzi05 ]
Roberto M. Avanzi
Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives
Cryptology ePrint Archive, 2005
Key Words:
public-key cryptography / elliptic curve cryptosystem, hyperelliptic curve cryptosystem, side-channel attacks, countermeasures
Full Paper:
http://eprint.iacr.org/2005/017.pdf


Misc [ BarbosaPage05 ]
Manuel Barbosa and Dan Page
On the Automatic Construction of Indistinguishable Operations
Cryptology ePrint Archive, 2005
Key Words:
implementation / Side-channel cryptanalysis, Countermeasures, Simple Power Analysis
Full Paper:
http://eprint.iacr.org/2005/174.pdf


Misc [ Bernstein05 ]
Daniel J. Bernstein
Cache-timing attacks on AES
2005
Key Words:
side channels, timing attacks, software timing attacks, cache timing, load timing, array-loopkups, S-boxes, AES.
Full Paper:
http://cr.yp.to/antiforgery/cachetiming-20050414.pdf


Misc [ CanovasClediere05 ]
Cecile Canovas and Jessy Clediere
What do S-boxes Say in Differential Side Channel Attacks?
Cryptology ePrint Archive, 2005
Key Words:
secret-key cryptography / side channel, differential power analysis, DPA, DEMA, CPA, DES, S-box, correlation, ghost peaks
Full Paper:
http://eprint.iacr.org/2005/311.pdf


Misc [ FengZhuXuLi05 ]
Min Feng and Bin B.Zhu and Maozhi Xu and Shipeng Li
Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis
Cryptology ePrint Archive, 2005
Key Words:
public-key cryptography / elliptic curve cryptosystem, smart cards,comb method, side channel attack
Full Paper:
http://eprint.iacr.org/2005/222.pdf


Misc [ Golic05 ]
Jovan Dj. Golic
Techniques for random masking in hardware
Cryptology ePrint Archive, 2005
Key Words:
implementation / power analysis, random masking, logic circuits
Full Paper:
http://eprint.iacr.org/2005/026.ps


Misc [ GratzerNaccache05 ]
Vanessa Gratzer and David Naccache
Blind Attacks on Engineering Samples
Cryptology ePrint Archive, 2005
Key Words:
implementation / side channel attacks, DPA, cryptophthora
Full Paper:
http://eprint.iacr.org/2005/468.pdf


Misc [ HanTakagi05 ]
Dong-Guk Han and Tsuyoshi Takagi
Some Analysis of Radix-r Representations
Cryptology ePrint Archive, 2005
Key Words:
public-key cryptography / pairing-based cryptosystems, radix-r representation, gNAF, wrNAF, side channel attacks.
Full Paper:
http://eprint.iacr.org/2005/402.pdf


Misc [ HanTakagiKimKimChung05 ]
Dong-Guk Han and Tsuyoshi Takagi and Tae Hyun Kim and Ho Won Kim and Kyo Il Chung
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Cryptology ePrint Archive, 2005
Key Words:
public-key cryptography / Side Channel Attacks, XTR public key system
Full Paper:
http://eprint.iacr.org/2005/316.pdf


Misc [ KimHaMoonYenLienKim05 ]
ChangKyun Kim and JaeCheol Ha and SangJae Moon and Sung-Ming Yen and Wei-Chih Lien and Sung-Hyun Kim
An Improved and Efficient Countermeasure against Power Analysis Attacks
Cryptology ePrint Archive, 2005
Key Words:
Side channel attack, DPA, RPA, ZPA, doubling attack, SPA, ECC, RSA
Full Paper:
http://eprint.iacr.org/2005/022.pdf


Misc [ MolnarPiotrowskiSchultzWagner05 ]
David Molnar and Matt Piotrowski and David Schultz and David Wagner
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks
Cryptology ePrint Archive, 2005
Key Words:
implementation / side channels, countermeasures, PC-model
Full Paper:
http://eprint.iacr.org/2005/368.pdf


Misc [ OsvikShamirTromer05 ]
Dag Arne Osvik and Adi Shamir and Eran Tromer
Cache attacks and Countermeasures: the Case of AES
Cryptology ePrint Archive, 2005
Key Words:
side-channel attack, cache, memory access, cryptanalysis, AES
Full Paper:
http://eprint.iacr.org/2005/271.pdf


Misc [ Page05 ]
D. Page
Partitioned Cache Architecture as a Side-Channel Defence Mechanism
Cryptology ePrint Archive, 2005
Key Words:
implementation / side-channel attack, cache architecture
Full Paper:
http://eprint.iacr.org/2005/280.pdf


Misc [ RostovtsevShemyakina05 ]
Rostovtsev A.G. and Shemyakina O.V.
AES side channel attack protection using random isomorphisms
Cryptology ePrint Archive, 2005
Key Words:
secret-key cryptography / AES, block ciphers, finite field, random isomorphism, side-channel attack
Full Paper:
http://eprint.iacr.org/2005/087.pdf


Misc [ StebilaTheriault ]
Douglas Stebila and Nicolas Thériault
Unified Point Addition Formul} and Side-Channel Attacks
Cryptology ePrint Archive, 2005
Key Words:
public-key cryptography / elliptic curve cryptosystem
Full Paper:
http://eprint.iacr.org/2005/419.pdf


Misc [ Theriault05 ]
Nicolas Thériault
SPA Resistant Left-to-Right Integer Recodings
Cryptology ePrint Archive, 2005
Key Words:
public-key cryptography / public-key cryptography, elliptic curve cryptosystem, hyperelliptic curve cryptosystem, side-channel attacks, countermeasures.
Full Paper:
http://eprint.iacr.org/2005/125.pdf


Misc [ XiaoHeys05 ]
Lu Xiao and Howard M. Heys
An Improved Power Analysis Attack Against Camellia's Key Schedule
Cryptology ePrint Archive, 2005
Key Words:
secret-key cryptography / block ciphers, cryptanalysis, implementation, secret-key cryptography, smart cards, side channel attacks
Full Paper:
http://eprint.iacr.org/2005/338.pdf


Misc [ ZhouFeng05 ]
YongBin Zhou and DengGuo Feng
Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing
Cryptology ePrint Archive, 2005
Key Words:
implementation
Full Paper:
http://eprint.iacr.org/2005/388.pdf


Misc [ AciicmezKoc06 ]
Onur Aciçmez and Çetin Kaya Koç
Trace Driven Cache Attack on AES
Cryptology ePrint Archive, Report 2006/138, 2006
Key Words:
cache attack, trace driven, side-channel cryptanalysis, AES
Full Paper:
http://eprint.iacr.org/2006/138.pdf


Misc [ AciicmezKocSeifert06 ]
Onur Aciicmez and Cetin Kaya Koc and Jean-Pierre Seifert
On the Power of Simple Branch Prediction Analysis
Cryptology ePrint Archive, Report 2006/351, 2006
Key Words:
Branch Prediction Analysis, Countermeasures, Modular Exponentiation, RSA, Side Channel Analysis
Full Paper:
http://eprint.iacr.org/2006/351.pdf


Misc [ AciicmezSeifertKoc06 ]
Onur Aciicmez and Jean-Pierre Seifert and Cetin Kaya Koc
Predicting Secret Keys via Branch Prediction
Cryptology ePrint Archive, Report 2006/288, 2006
Key Words:
Branch Prediction, Modular Exponentiation, Montgomery Multiplication, RSA, Side Channel Analysis, Simultaneous Multithreading, Trusted Computing.
Full Paper:
http://eprint.iacr.org/2006/288.pdf


Misc [ AgostaPelosi06 ]
Giovanni Agosta and Gerardo Pelosi
Countermeasures for the Simple Branch Prediction Analysis
Cryptology ePrint Archive, Report 2006/482, 2006
Full Paper:
http://eprint.iacr.org/2006/482.pdf


Misc [ AravamuthanThumparthy06 ]
Sarang Aravamuthan and Viswanatha Rao Thumparthy
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks
Cryptology ePrint Archive, Report 2006/316, 2006
Key Words:
authentication, ECDSA, parallel implementation, power analysis attacks.
Full Paper:
http://eprint.iacr.org/2006/316.pdf


Misc [ BenoitTunstall06 ]
Olivier Benoit and Michael Tunstall
Efficient Use of Random Delays
Cryptology ePrint Archive, Report 2006/272, 2006
Full Paper:
http://eprint.iacr.org/2006/272.pdf


Misc [ Bonneau06 ]
Joseph Bonneau
Robust Final-Round Cache-Trace Attacks Against AES
Cryptology ePrint Archive, Report 2006/374, 2006
Key Words:
AES, cryptanalysis, side-channel attack, power analysis, cache.
Full Paper:
http://eprint.iacr.org/2006/374.pdf


Misc [ BrickellGraunkeNeveSeifert06 ]
Ernie Brickell and Gary Graunke and Michael Neve and Jean-Pierre Seifert
Software mitigations to hedge AES against cache-based software side channel vulnerabilities
Cryptology ePrint Archive, Report 2006/052, 2006
Key Words:
implementation / AES, Countermeasures, Computer architecture, Computer security, Software side channels
Full Paper:
http://eprint.iacr.org/2006/052.pdf


Misc [ KimTakagiHanKimLim06 ]
Tae Hyun Kim and Tsuyoshi Takagi and Dong-Guk Han and Ho Won Kim and Jongin Lim
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Cryptology ePrint Archive, Report 2006/243, 2006
Key Words:
Pairing based cryptosystems, Side channel attacks, Differential Power Analysis, Randomized projective coordinate systems, Eta pairing
Full Paper:
http://eprint.iacr.org/2006/243.pdf


Misc [ Kocar06 ]
Osman Kocar
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior
Cryptology ePrint Archive, Report 2006/192, 2006
Full Paper:
http://eprint.iacr.org/2006/192.pdf


Misc [ Nicolas06 ]
Meloni Nicolas
Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains
Cryptology ePrint Archive, Report 2006/216, 2006
Full Paper:
http://eprint.iacr.org/2006/216.pdf


Misc [ Page06 ]
D. Page
A Note On Side-Channels Resulting From Dynamic Compilation
Cryptology ePrint Archive, Report 2006/349, 2006
Full Paper:
http://eprint.iacr.org/2006/349.pdf


Misc [ StandaertMalkinYung06 ]
Francois-Xavier Standaert and Tal G. Malkin and Moti Yung
A Formal Practice-Oriented Model For The Analysis of Side-Channel Attacks
Cryptology ePrint Archive, Report 2006/139, 2006
Key Words:
implementations / physically observable cryptography, side-channel attacks, provable security, block ciphers, information theory
Full Paper:
http://eprint.iacr.org/2006/139.pdf


Misc [ WhelanScott06 ]
Claire Whelan and Mike Scott
Side Channel Analysis of Practical Pairing Implementations: Which Path is More Secure?
Cryptology ePrint Archive, Report 2006/237, 2006
Key Words:
Side Channel Analysis (SCA), Pairing Based Cryptography, Correlation Power Analysis (CPA), Tate Pairing.
Full Paper:
http://eprint.iacr.org/2006/237.pdf


Techreport [ Dhem1998 ]
J.-F. Dhem and F. Koene and P.-A. Leroux and P. Mestré and J.-J. Quisquater and J.L. Willems
A practical implementation of the timing attack
1998
Full Paper:
http://citeseer.ist.psu.edu/cache/papers/cs/2622/http:zSzzSzwww.dice.ucl.ac.bezSzcryptozSztech
_reportszSzCG1998_1.pdf/dhem98practical.pdf


Techreport [ KoeneQuisquater99 ]
François Koeune and Jean-Jacques Quisquater
A timing attack against Rijndael
1999
Full Paper:
http://citeseer.ist.psu.edu/cache/papers/cs/12713/http:zSzzSzwww.dice.ucl.ac.bezSzcryptozSztech
_reportszSzCG1999_1.pdf/koeune99timing.pdf


Techreport [ SchindlerKoeneQuisquater2001 ]
Werner Schindler and François Koene and Jean-Jacques Quisquater
Unleashing the full power of timing attack
2001
Full Paper:
http://citeseer.ist.psu.edu/cache/papers/cs/25617/http:zSzzSzwww.dice.ucl.ac.be.zSzcryptozSztech
_reportszSzCG2001_3.pdf/schindler01unleashing.pdf


Techreport [ OswaldPreneel02 ]
Elisabeth Oswald and Bart Preneel
A Theoretical Evaluation of some of the NESSIE Candidates regarding their Susceptibility towards Power Analysis Attacks
2002
Full Paper:
http://www.iaik.tu-graz.ac.at/aboutus/people/oswald/papers/NESSIE_BC_main.pdf




Other Links to Publication Listings

Informatik Uni Trier: Database containing all publications in computer science in relevant journals and conferences
ECRYPT: All ECRYPT public documents
Side-Channel Analysis Lab @ IAIK: Publications of the SCA Lab, IAIK, Graz University of Technology, Austria
Gemplus Research Publications: One of the major players in smart cards and a member of ECRYPT
Side Channel Attacks Database: Listing of publications and patents, maintained by the Reliable Computing Laboratory at Boston University, USA.
Cryptology ePrint Archive: IACR Cryptology ePrint Archive



Conferences

Workshop on Cryptographic Hardware and Embedded Systems (CHES): CHES is the relevant conference for research in Side Channel Cryptanalysis. Contents of previous workshops can be found here.

Side Channel Cryptanalysis is also a topic at some other regular conferences. Among them are
Selected Areas in Cryptography (SAC). Contents of previous workshops can be found here.
RSA Conference, Cryptographers' Track (CT-RSA). Contents of previous workshops can be found here.
Fast Software Encryption (FSE). Contents of previous workshops can be found here.
Public Key Cryptography (PKC). Contents of previous workshops can be found here.
Workshop on Information Security Applications (WISA). Contents of previous workshops can be found here.
Smart Card Research and Advanced Applications (CARDIS). Contents of previous workshops can be found here.



Impressum

ECRYPT - Network of Excellence in Cryptology (contract number IST-2002-507932)

The Side Channel Cryptanalysis Lounge is provided by the ECRYPT Network of Excellence ( http://www.ecrypt.eu.org ). It is maintained by the virtual lab VAMPIRE .

Contact for the Side Channel Cryptanalysis Lounge:
Kerstin Lemke-Rust
Ruhr-Universität Bochum
Germany

Disclaimer

The information on this web site is provided as is, and no guarantee or warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability.