Cryptography Reference
In-Depth Information
been proposed as new alternatives to the basic PCA. One other possible key point
that could be investigated is the improvement of our distinguisher by combining
different CS (the mean, the variance, the entropy ...), in order to make more
eligible the description of the leakage related to the secret information.
References
1. Aabid, M.A.E., Guilley, S., Hoogvorst, P.: Template Attacks with a Power Model.
Cryptology ePrint Archive, Report 2007/443 (December 2007),
http://eprint.iacr.org/2007/443/
2. Abaraham, D.G., Dolan, G.M., Double, G.P., Stevens, J.V.: Transaction security
system. IBM Systems Journal 30(2), 206-229 (1991)
3. Archambeau, C., Peeters, E., Standaert, F.-X., Quisquater, J.-J.: Template at-
tacks in principal subspaces. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS,
vol. 4249, pp. 1-14. Springer, Heidelberg (2006)
4. Batina, L., Gierlichs, B., Lemke-Rust, K.: Comparative Evaluation of Rank Corre-
lation Based DPA on an AES Prototype Chip. In: Wu, T.-C., Lei, C.-L., Rijmen,
V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 341-354. Springer, Heidelberg
(2008)
5. Bevan, R., Knudsen, E.: Ways to Enhance Differential Power Analysis. In: Lee, P.J.,
Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 327-342. Springer, Heidelberg
(2003)
6. Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model.
In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29.
Springer, Heidelberg (2004)
7. David, H., Nagaraja, H.N.: Order Statistics. Wiley, Chichester
8. Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual Information Analysis - A
Generic Side-Channel Distinguisher. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008.
LNCS, vol. 5154, pp. 426-442. Springer, Heidelberg (2008)
9. Gierlichs, B., De Mulder, E., Preneel, B., Verbauwhede, I.: Empirical comparison of
side channel analysis distinguishers on DES in hardware. In: IEEE (ed.) ECCTD.
European Conference on Circuit Theory and Design, Antalya, Turkey, August 23-
27, pp. 391-394 (2009)
10. Guilley, S., Chaudhuri, S., Sauvage, L., Hoogvorst, P., Pacalet, R., Bertoni, G.M.:
Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks.
IEEE Transactions on Computers 57(11), 1482-1497 (2008)
11. Guilley, S., Hoogvorst, P., Pacalet, R.: A Fast Pipelined Multi-Mode DES Ar-
chitecture Operating in IP Representation. Integration, The VLSI Journal 40(4),
479-489 (2007), doi:10.1016/j.vlsi.2006.06.004
12. Jolliffe, I.T.: Principal Component Analysis. Springer Series in Statistics (2002)
ISBN: 0387954422
13. Khattree, R., Naik, D.N.: Multivariate data reduction and descrimination (2000)
14. Koichi, I., Masahiko, T., Naoya, T.: Encryption secured against DPA, Fujitsu US
Patent 7386130 (June 10, 2008),
http://www.patentstorm.us/patents/7386130/fulltext.html
15. U. Kyungnam Kim Department of Computer Science University of Maryland. Face
recognition using principal component analysis (February 26, 2002)
16. Le, T.-H., Canovas, C., Clediere, J.: An overview of side channel analysis attacks.
In: ASIACCS, ASIAN ACM Symposium on Information, Computer and Commu-
nications Security, Tokyo, Japan, pp. 33-43 (2008), doi:10.1145/1368310.1368319
 
Search WWH ::




Custom Search