Sciweavers

62 search results - page 1 / 13
» DPA Attacks and S-Boxes
Sort
View
CHES
2000
Springer
204views Cryptology» more  CHES 2000»
13 years 9 months ago
Using Second-Order Power Analysis to Attack DPA Resistant Software
Under a simple power leakage model based on Hamming weight, a software implementation of a data-whitening routine is shown to be vulnerable to a first-order Differential Power Anal...
Thomas S. Messerges
CHES
2007
Springer
95views Cryptology» more  CHES 2007»
13 years 11 months ago
Side Channel Cryptanalysis of a Higher Order Masking Scheme
Abstract. In the recent years, DPA attacks have been widely investigated. In particular, 2-nd order DPA have been improved and successfully applied to break many masked implementat...
Jean-Sébastien Coron, Emmanuel Prouff, Matt...
CHES
2008
Springer
135views Cryptology» more  CHES 2008»
13 years 6 months ago
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform
At CHES 2006, a DPA countermeasure based on the Fourier Transform was published. This generic countermeasure aims at protecting from DPA any S-box calculation used in symmetric cry...
Jean-Sébastien Coron, Christophe Giraud, Em...
FSE
2005
Springer
108views Cryptology» more  FSE 2005»
13 years 10 months ago
DPA Attacks and S-Boxes
For the power consumption model called Hamming weight model, we rewrite DPA attacks in terms of correlation coefficients between two Boolean functions. We exhibit properties of S-b...
Emmanuel Prouff
CHES
2005
Springer
80views Cryptology» more  CHES 2005»
13 years 10 months ago
Successfully Attacking Masked AES Hardware Implementations
During the last years, several masking schemes for AES have been proposed to secure hardware implementations against DPA attacks. In order to investigate the effectiveness of thes...
Stefan Mangard, Norbert Pramstaller, Elisabeth Osw...