Improved higher-order side-channel attacks with FPGA experiments

71Citations
Citations of this article
58Readers
Mendeley users who have this article in their library.

Abstract

We demonstrate that masking a block cipher implementation does not sufficiently improve its security against side-channel attacks. Under exactly the same hypotheses as in a Differential Power Analysis (DPA), we describe an improvement of the previously introduced higher-order techniques allowing us to defeat masked implementations in a low (i.e. practically tractable) number of measurements. The proposed technique is based on the efficient use of the statistical distributions of the power consumption in an actual design. It is confirmed both by theoretical predictions and practical experiments against FPGA devices. © International Association for Cryptologic Research 2005.

Cite

CITATION STYLE

APA

Peeters, E., Standaert, F. X., Donckers, N., & Quisquater, J. J. (2005). Improved higher-order side-channel attacks with FPGA experiments. In Lecture Notes in Computer Science (Vol. 3659, pp. 309–323). Springer Verlag. https://doi.org/10.1007/11545262_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free