
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Andrey Bogdanov, Ilya Kizhvatov, "Beyond the Limits of DPA: Combined SideChannel Collision Attacks," IEEE Transactions on Computers, vol. 61, no. 8, pp. 11531164, Aug., 2012.  
BibTex  x  
@article{ 10.1109/TC.2011.140, author = {Andrey Bogdanov and Ilya Kizhvatov}, title = {Beyond the Limits of DPA: Combined SideChannel Collision Attacks}, journal ={IEEE Transactions on Computers}, volume = {61}, number = {8}, issn = {00189340}, year = {2012}, pages = {11531164}, doi = {http://doi.ieeecomputersociety.org/10.1109/TC.2011.140}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Computers TI  Beyond the Limits of DPA: Combined SideChannel Collision Attacks IS  8 SN  00189340 SP1153 EP1164 EPD  11531164 A1  Andrey Bogdanov, A1  Ilya Kizhvatov, PY  2012 KW  Analysis of algorithms and problem complexity KW  data encryption KW  cryptographic implementations KW  physical security KW  sidechannel analysis KW  collision attacks KW  AES. VL  61 JA  IEEE Transactions on Computers ER   
[1] C. Archambeau, E. Peeters, F.X. Standaert, and J.J. Quisquater, "Template Attacks in Principal Subspaces," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '06), pp. 114, 2006.
[2] L. Batina, B. Gierlichs, and K. LemkeRust, "Differential Cluster Analysis," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '09), pp. 112127, 2009.
[3] L. Batina, B. Gierlichs, E. Prouff, M. Rivain, F.X. Standaert, and N. VeyratCharvillon, "Mutual Information Analysis: A Comprehensive Study," J. Cryptology, vol. 24, no. 2, pp. 269291, 2011.
[4] A. Biryukov, A. Bogdanov, D. Khovratovich, and T. Kasper, "Collision Attacks on AlphaMAC and Other AESBased MACs," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '07), pp. 166180, 2007.
[5] A. Biryukov and D. Khovratovich, "Two New Techniques of SideChannel Cryptanalysis," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '07), pp. 195208, 2007.
[6] A. Bogdanov, "Improved SideChannel Collision Attacks on AES," Proc. Int'l Conf. Selected Areas in Cryptography (SAC '07), pp. 8495, 2007.
[7] A. Bogdanov, "MultipleDifferential SideChannel Collision Attacks on AES," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '08), pp. 3044, 2008.
[8] A. Bogdanov, I. Kizhvatov, and A. Pyshkin, "Algebraic Methods in SideChannel Collision Attacks and Practical Collision Detection," Proc. Int'l Conf. Cryptology in India: Progress in Cryptology (INDOCRYPT '08), pp. 251265, 2008.
[9] E. Brier, C. Clavier, and F. Olivier, "Correlation Power Analysis with a Leakage Model," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '04), pp. 1629, 2004.
[10] S. Chari, J.R. Rao, and P. Rohatgi, "Template Attacks," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '02), pp. 5162, 2003.
[11] FIPS, Advanced Encryption Standard. Publication 197, Nat'l Bureau of Standards, US Dept. of Commerce, 2001.
[12] B. Gierlichs, K. LemkeRust, and C. Paar, "Templates vs. Stochastic Methods," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '06), pp. 1529, 2006.
[13] H. Handschuh and B. Preneel, "Blind Differential Cryptanalysis for Enhanced Power Attacks," Proc. Int'l Conf. Selected Areas in Cryptography (SAC '06), pp. 163173, 2006.
[14] J. Kim, Y. Lee, and S. Lee, "DES with Any Reduced Masked Rounds Is Not Secure against SideChannel Attacks," Computers and Math. with Applications, vol. 60, no. 2, pp. 347354, 2010.
[15] P.C. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," Proc. Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '99), pp. 388397, 1999.
[16] H. Ledig, F. Muller, and F. Valette, "Enhancing Collision Attacks," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '04), pp. 176190, 2004.
[17] S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards. SpringerVerlag, 2007.
[18] S. Mangard, E. Oswald, and F.X. Standaert, "One for All  All for One: Unifying Standard DPA Attacks," IET Information Security, vol. 5, no. 2, pp. 100110, June 2011.
[19] A. Moradi, O. Mischke, and T. Eisenbarth, "CorrelationEnhanced Power Analysis Collision Attack," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '10), pp. 125139, 2010.
[20] J. Pan, J.I. den Hartog, and J. Lu, "You Cannot Hide behind the Mask: Power Analysis on a Provably Secure SBox Implementation," Information Security Applications, pp. 178192, SpringerVerlag, 2009.
[21] M. Renauld, F.X. Standaert, and N. VeyratCharvillon, "Algebraic SideChannel Attacks on the AES: Why Time Also Matters in DPA," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '09), pp. 97111, 2009.
[22] W. Schindler, K. Lemke, and C. Paar, "A Stochastic Model for Differential Side Channel Cryptanalysis," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '05), pp. 3046, 2005.
[23] K. Schramm, G. Leander, P. Felke, and C. Paar, "A CollisionAttack on AES: Combining Side Channel and DifferentialAttack," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '04), pp. 163175, 2004.
[24] K. Schramm, T.J. Wollinger, and C. Paar, "A New Class of Collision Attacks and Its Application to DES," Proc. Int'l Workshop Fast Software Encryption (FSE '03), pp. 206222, 2003.
[25] F.X. Standaert, T. Malkin, and M. Yung, "A Unified Framework for the Analysis of SideChannel Key Recovery Attacks," Proc. Ann. Int'l Conf. Advances in Cryptology: The Theory and Applications of Cryptographic Techniques (EUROCRYPT '09), pp. 443461, 2009.
[26] A. Wiemers, "Collision Attacks for Comp128 on Smartcards," Proc. ECCBrainpool WorkshopSideChannel Attacks on Cryptographic Algorithms, Dec. 2001.