Principles of CMOS VLSI design: a systems perspective
Principles of CMOS VLSI design: a systems perspective
Electromagnetic radiation from video display units: an eavesdropping risk?
Computers and Security
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
IEEE Micro
Java Card: Internet Computing on a Smart Card
IEEE Internet Computing
Side Channel Cryptanalysis of Product Ciphers
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
A Practical Implementation of the Timing Attack
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
Differential Cryptanalysis of the Full 16-Round DES
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Differential Fault Analysis of Secret Key Cryptosystems
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
DES and Differential Power Analysis (The "Duplication" Method)
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Power analysis attacks and countermeasures for cryptographic algorithms
Power analysis attacks and countermeasures for cryptographic algorithms
Investigations of power analysis attacks on smartcards
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
On the importance of checking cryptographic protocols for faults
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
A novel architecture for power maskable arithmetic units
Proceedings of the 13th ACM Great Lakes symposium on VLSI
Energy-aware design techniques for differential power analysis protection
Proceedings of the 40th annual Design Automation Conference
Hardware architectures for public key cryptography
Integration, the VLSI Journal
Energy-efficient data scrambling on memory-processor interfaces
Proceedings of the 2003 international symposium on Low power electronics and design
Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
Security in embedded systems: Design challenges
ACM Transactions on Embedded Computing Systems (TECS)
An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks
IEEE Transactions on Dependable and Secure Computing
Cryptanalysis of a flexible remote user authentication scheme using smart cards
ACM SIGOPS Operating Systems Review
Design and Analysis of Dual-Rail Circuits for Security Applications
IEEE Transactions on Computers
Simulation models for side-channel information leaks
Proceedings of the 42nd annual Design Automation Conference
A simple power analysis attack against the key schedule of the Camellia block cipher
Information Processing Letters
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
Proceedings of the conference on Design, automation and test in Europe: Designers' forum
On two DES implementations secure against differential power analysis in smart-cards
Information and Computation
Power and electromagnetic analysis: improved model, consequences and comparisons
Integration, the VLSI Journal - Special issue: Embedded cryptographic hardware
Dynamic differential self-timed logic families for robust and low-power security ICs
Integration, the VLSI Journal
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
Computer Standards & Interfaces
Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware
Proceedings of the conference on Design, automation and test in Europe
Proceedings of the 44th annual Design Automation Conference
RIJID: random code injection to mask power analysis based side channel attacks
Proceedings of the 44th annual Design Automation Conference
A smart random code injection to mask power analysis based side channel attacks
CODES+ISSS '07 Proceedings of the 5th IEEE/ACM international conference on Hardware/software codesign and system synthesis
Remote Password Extraction from RFID Tags
IEEE Transactions on Computers
IEEE Transactions on Dependable and Secure Computing
Aiding side-channel attacks on cryptographic software with satisfiability-based analysis
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
An overview of side channel analysis attacks
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Two-factor mutual authentication based on smart cards and passwords
Journal of Computer and System Sciences
A secure dynamic ID based remote user authentication scheme for multi-server environment
Computer Standards & Interfaces
Differential Capacitance Analysis
Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation
Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design
More secure remote user authentication scheme
Computer Communications
Computer Standards & Interfaces
An improved smart card based password authentication scheme with provable security
Computer Standards & Interfaces
Information Security and Cryptology --- ICISC 2008
Computer Standards & Interfaces
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Enhancing of a Password-Based Authentication Scheme Using Smart Cards
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part II
Cryptanalysis and improvement on remote user mutual authentication scheme with smart cards
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
A simple power analysis attack against the key schedule of the Camellia block cipher
Information Processing Letters
Cryptanalysis of a remote user authentication scheme using smart cards
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
An improvement of Hsiang-Shih's authentication scheme using smart cards
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
An improvement of Xu et al.'s authentication scheme using smart cards
Proceedings of the Third Annual ACM Bangalore Conference
Reverse engineering java card applets using power analysis
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Ways to enhance differential power analysis
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Safe-error attack on SPA-FA resistant exponentiations using a HW modular multiplier
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
A simple and efficient key exchange scheme against the smart card loss problem
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Vulnerabilities in a remote agent authentication scheme using smart cards
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
WSEAS Transactions on Information Science and Applications
Security analysis of 'two-factor user authentication in wireless sensor networks'
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Two robust remote user authentication protocols using smart cards
Journal of Systems and Software
A general power model of differential power analysis attacks to static logic circuits
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Leakage power analysis attacks: a novel class of attacks to nanometer cryptographic circuits
IEEE Transactions on Circuits and Systems Part I: Regular Papers
Mutual information analysis under the view of higher-order statistics
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
An exquisite authentication scheme with key agreement preserving user anonymity
WISM'10 Proceedings of the 2010 international conference on Web information systems and mining
Robust authentication and key agreement scheme preserving the privacy of secret key
Computer Communications
Robust one-time password authentication scheme using smart card for home network environment
Computer Communications
A strong user authentication scheme with smart cards for wireless communications
Computer Communications
A secure dynamic identity based authentication protocol for multi-server architecture
Journal of Network and Computer Applications
Weaknesses of a dynamic ID-based remote user authentication scheme
International Journal of Electronic Security and Digital Forensics
Improving DPA by peak distribution analysis
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Location-based authentication protocol for first cognitive radio networking standard
Journal of Network and Computer Applications
FinFET-Based Power Management for Improved DPA Resistance with Low Overhead
ACM Journal on Emerging Technologies in Computing Systems (JETC)
Differential fault analysis of Sosemanuk
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Cryptanalysis to a remote user authentication scheme using smart cards for multi-server environment
HI'11 Proceedings of the 2011 international conference on Human interface and the management of information - Volume Part I
AUTHHOTP- HOTP based authentication scheme over home network environment
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part III
Electromagnetic analysis enhancement with signal processing techniques
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
A robust remote user authentication scheme against smart card security breach
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Cryptanalysis of nonce-based mutual authentication scheme using smart cards
ICHIT'11 Proceedings of the 5th international conference on Convergence and hybrid information technology
Digital identity security architecture in Ethos
Proceedings of the 7th ACM workshop on Digital identity management
Efficient remote user authentication scheme using smart cards
International Journal of Internet Technology and Secured Transactions
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Side channel analysis of practical pairing implementations: which path is more secure?
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Generic cryptanalysis of combined countermeasures with randomized BSD representations
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Side channel attacks on message authentication codes
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
A proposition for correlation power analysis enhancement
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Three-phase dual-rail pre-charge logic
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Secure dynamic identity-based remote user authentication scheme
ICDCIT'10 Proceedings of the 6th international conference on Distributed Computing and Internet Technology
Robust secret key based authentication scheme using smart cards
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
Side-channel leakage of masked CMOS gates
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
The fuzzy engine for random number generator in crypto module
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Weaknesses in a dynamic ID-based remote user authentication scheme for multi-server environment
International Journal of Electronic Security and Digital Forensics
GPC'10 Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing
Secure and efficient AES software implementation for smart cards
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Small size, low power, side channel-immune AES coprocessor: design and synthesis results
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Masked dual-rail pre-charge logic: DPA-resistance without routing constraints
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Masking at gate level in the presence of glitches
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
On second-order differential power analysis
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Improved higher-order side-channel attacks with FPGA experiments
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Secure AES hardware module for resource constrained devices
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
An improved dynamic ID-based remote user authentication with key agreement scheme
Computers and Electrical Engineering
Attacking and improving on lee and chiu’s authentication scheme using smart cards
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Power modeling of precharged address bus and application to multi-bit DPA attacks to DES algorithm
PATMOS'06 Proceedings of the 16th international conference on Integrated Circuit and System Design: power and Timing Modeling, Optimization and Simulation
Techniques to enhance the resistance of precharged busses to differential power analysis
PATMOS'06 Proceedings of the 16th international conference on Integrated Circuit and System Design: power and Timing Modeling, Optimization and Simulation
Cryptanalysis and improvement of sood et al.'s dynamic ID-Based authentication scheme
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
PKDPA: an enhanced probabilistic differential power attack methodology
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
International Journal of Network Management
Review: Dynamic ID-based remote user password authentication schemes using smart cards: A review
Journal of Network and Computer Applications
Mobile device integration of a fingerprint biometric remote authentication scheme
International Journal of Communication Systems
A new dynamic ID-Based remote user authentication scheme with forward secrecy
APWeb'12 Proceedings of the 14th international conference on Web Technologies and Applications
Robust smart-cards-based user authentication scheme with user anonymity
Security and Communication Networks
A More Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Randomized Instruction Injection to Counter Power Analysis Attacks
ACM Transactions on Embedded Computing Systems (TECS)
Secure password-based remote user authentication scheme with non-tamper resistant smart cards
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
An Efficient Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
An Improved Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
A model of DPA syndrome and its application to the identification of leaking gates
PATMOS'07 Proceedings of the 17th international conference on Integrated Circuit and System Design: power and timing modeling, optimization and simulation
Security and Communication Networks
Randomized execution algorithms for smart cards to resist power analysis attacks
Journal of Systems Architecture: the EUROMICRO Journal
A password authentication scheme against smart card security breach
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
Future Generation Computer Systems
Comments on an advanced dynamic ID-Based authentication scheme for cloud computing
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
Security analysis of a secure and practical dynamic identity-based remote user authentication scheme
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
A statistical model for DPA with novel algorithmic confusion analysis
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
NSS'12 Proceedings of the 6th international conference on Network and System Security
Java card combined attacks with localization-agnostic fault injection
CARDIS'12 Proceedings of the 11th international conference on Smart Card Research and Advanced Applications
Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment
Wireless Personal Communications: An International Journal
Key-Dependent weakness of AES-Based ciphers under clockwise collision distinguisher
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Role of power grid in side channel attack and power-grid-aware secure design
Proceedings of the 50th Annual Design Automation Conference
Implementation of correlation power analysis attack on an FPGA DES design
International Journal of Information and Communication Technology
Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication
Wireless Personal Communications: An International Journal
An Authentication Scheme for Secure Access to Healthcare Services
Journal of Medical Systems
Journal of Medical Systems
BICS'13 Proceedings of the 6th international conference on Advances in Brain Inspired Cognitive Systems
Differential photonic emission analysis
COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce
Journal of Medical Systems
Journal of Medical Systems
Journal of Medical Systems
Advanced remote user authentication protocol for multi-server architecture based on ECC
Journal of Information Security and Applications
An improved side channel attack using event information of subtraction
Journal of Network and Computer Applications
International Journal of Information and Communication Technology
On the security of an authentication scheme for multi-server architecture
International Journal of Electronic Security and Digital Forensics
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
Wireless Personal Communications: An International Journal
Enhanced Dynamic Authentication Scheme (EDAS)
Information Systems Frontiers
Hi-index | 14.99 |
This paper examines how monitoring power consumption signals might breach smart-card security. Both simple power analysis and differential power analysis attacks are investigated. The theory behind these attacks is reviewed. Then, we concentrate on showing how power analysis theory can be applied to attack an actual smart card. We examine the noise characteristics of the power signals and develop an approach to model the signal-to-noise ratio (SNR). We show how this SNR can be significantly improved using a multiple-bit attack. Experimental results against a smart-card implementation of the Data Encryption Standard demonstrate the effectiveness of our multiple-bit attack. Potential countermeasures to these attacks are also discussed.