Sign-Based differential power analysis

7Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Differential Power Analysis (DPA) by Paul Kocher et al. is expanded with the information that is hidden in the sign of power biases. The latter reveal values that collide with the DPA target value within the circuitry. With the help of cross-iteration comparisons, the interpretation of those values can provide significant amounts of the information required to reverse engineer secret algorithm. We have successfully launched a demonstration attack on a secret authentication and sessionkey generation algorithm implemented on SIM cards in GSM networks. The findings provide guidance for designing tamper resistant devices that are secure against this kind of attack. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Novak, R. (2004). Sign-Based differential power analysis. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2908, 203–216. https://doi.org/10.1007/978-3-540-24591-9_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free