We demonstrate that masking a block cipher implementation does not sufficiently improve its security against side-channel attacks. Under exactly the same hypotheses as in a Differential Power Analysis (DPA), we describe an improvement of the previously introduced higher-order techniques allowing us to defeat masked implementations in a low (i.e. practically tractable) number of measurements. The proposed technique is based on the efficient use of the statistical distributions of the power consumption in an actual design. It is confirmed both by theoretical predictions and practical experiments against FPGA devices. © International Association for Cryptologic Research 2005.
CITATION STYLE
Peeters, E., Standaert, F. X., Donckers, N., & Quisquater, J. J. (2005). Improved higher-order side-channel attacks with FPGA experiments. In Lecture Notes in Computer Science (Vol. 3659, pp. 309–323). Springer Verlag. https://doi.org/10.1007/11545262_23
Mendeley helps you to discover research relevant for your work.