CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
How to Compare Profiled Side-Channel Attacks?
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption
Information Security Applications
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Templates vs. stochastic methods
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
A stochastic model for differential side channel cryptanalysis
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Template attacks on masking—resistance is futile
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Analyzing side channel leakage of masked implementations with stochastic methods
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Hi-index | 0.00 |
In typical Profiled Power Analysis Attacks, like Template Attack (TA) and Stochastic Model based Power Analysis (SMPA), key-recovery efficiency is strongly influenced by the accuracy of characterization in profiling. In order to accurately characterize signals and noises in different times, a large number of power traces is usually needed in profiling. However, a large number of power traces is not always available. In this case, the accuracy of characterization is rapidly degraded, and so it is with the efficiency of subsequent key-recovery. In light of this, we present an efficient Covariance Analysis based Characterization Method (CACM for short) to deal with the problem of more accurate leakage characterization with less power traces. We perform experimental power analysis attacks against an AES software implementation on STC89C52 microcontroller, then conduct a comparative study of the effectiveness of these profiled attacks. The results firmly support the validity and efficiency of our method.