Digital integrated circuits: a design perspective
Digital integrated circuits: a design perspective
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Power-Analysis Attack on an ASIC AES implementation
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
An overview of side channel analysis attacks
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
Fast Software Encryption
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
Vulnerability modeling of cryptographic hardware to power analysis attacks
Integration, the VLSI Journal
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules
Information Security Applications
A generic method for secure Sbox implementation
WISA'07 Proceedings of the 8th international conference on Information security applications
Improving first order differential power attacks through digital signal processing
Proceedings of the 3rd international conference on Security of information and networks
Far correlation-based EMA with a precharacterized leakage model
Proceedings of the Conference on Design, Automation and Test in Europe
Correlation power analysis based on switching glitch model
WISA'10 Proceedings of the 11th international conference on Information security applications
Shape analysis for power signal cryptanalysis on secure components
Journal of Systems and Software
Information leakage discovery techniques to enhance secure chip design
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Side-channel analysis of PUFs and fuzzy extractors
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
First principal components analysis: a new side channel distinguisher
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Proceedings of the 18th ACM conference on Computer and communications security
Galois LFSR, embedded devices and side channel weaknesses
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
A first-order leak-free masking countermeasure
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
Conversion of security proofs from one leakage model to another: a new issue
COSADE'12 Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design
Optimal first-order masking with linear and non-linear bijections
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
CARDIS'12 Proceedings of the 11th international conference on Smart Card Research and Advanced Applications
Key-Dependent weakness of AES-Based ciphers under clockwise collision distinguisher
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
ACM Transactions on Information and System Security (TISSEC)
Secure and efficient design of software block cipher implementations on microcontrollers
International Journal of Grid and Utility Computing
On measurable side-channel leaks inside ASIC design primitives
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Hi-index | 0.00 |
Since their publication in 1998 and 2001, respectively, Power and Electromagnetic Analysis (SPA, DPA, EMA) have been successfully used to retrieve secret information stored in cryptographic devices. Both attacks usually model the side-channel leakages using the so-called "Hamming weight" and "Hamming distance" models, i.e. they only consider the number of bit transitions in a device as an image of its leakage. In these models, the main difference between power and electromagnetic analysis is assumed to be the fact that the latter allows space localization (i.e. to observe the leakage of only a part of the cryptographic device). In this paper, we make use of a more accurate leakage model for CMOS devices and investigate its consequences. In particular, we show that it is practically feasible to distinguish between 0 → 1 and 1 → 0 bit transitions in certain implementations and that electromagnetic analysis is particularly efficient in this respect. We denote this model as the "switching distance" leakage model and show how it may be very helpful to defeat some commonly used countermeasures (e.g. data buses precharged with random values). Then, we compare the different models and stress their respective constraints/advantages regarding practical attacks.