,
, Experiments against Software
, 125 6.10.1 Performances over Artificial Augmented Clock Jitter, p.125
, Experiments against Real-Case Hardware Countermeasures, p.128
,
, Billion Smart Cards Shipped in 2014 Driven by Growth in the Banking and SIM Card Markets
, , vol.8, pp.2018-2025
An implementation of DES and AES, secure against some attacks, International Workshop on Cryptographic Hardware and Embedded Systems, p.43, 2001. ,
Template Attacks in Principal Subspaces, Cryptographic Hardware and Embedded Systems -CHES, 2006. ,
, Lecture Notes in Computer Science, vol.4249, p.62, 2006.
Generalized discriminant analysis using a kernel approach, Neural computation, vol.12, p.92, 2000. ,
Verified Proofs of Higher-Order Masking, Advances in Cryptology -EUROCRYPT 2015 -34th Annual International Conference on the Theory and Applications of Cryptographic Techniques ,
URL : https://hal.archives-ouvertes.fr/hal-01216699
, Proceedings, Part I, pp.457-485, 2015.
Mutual information analysis: a comprehensive study, Journal of Cryptology, vol.24, pp.269-291, 2011. ,
Horizontal side-channel attacks and countermeasures on the ISW masking scheme, International Conference on Cryptographic Hardware and Embedded Systems, p.31, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01399577
Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations, vol.32, p.31, 2013. ,
Correlation power analysis with a leakage model, International Workshop on Cryptographic Hardware and Embedded Systems, vol.36, p.35, 2004. ,
URL : https://hal.archives-ouvertes.fr/hal-02487026
Improved template attacks, p.42, 2010. ,
Improved Side-Channel Analysis of Finite-Field Multiplication, Cryptographic Hardware and Embedded Systems -CHES 2015 -17th International Workshop, p.122, 2015. ,
Adaptive control processes: a guided tour, vol.2045, p.39, 2015. ,
Bias in estimating the variance of K-fold cross-validation". In: Statistical modeling and analysis for complex data problems, p.137, 2005. ,
Provably secure masking of AES, International Workshop on Selected Areas in Cryptography, p.43, 2004. ,
Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection, vol.75, p.63, 1997. ,
Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis". English, Topics in Cryptology CT-RSA 2012, vol.7178, pp.978-981, 2012. ,
Combined software and hardware attacks on the java card control flow, International Conference on Smart Card Research and Advanced Applications, p.10, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00684616
A more efficient AES threshold implementation, International Conference on Cryptology in Africa, p.43, 2014. ,
Pattern recognition and machine learning, vol.64, 2006. ,
Ways to enhance differential power analysis, International Conference on Information Security and Cryptology, p.36, 2002. ,
Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines, Smart Card Research and Advanced Applications. Ed. by Stefan Mangard, vol.7771, p.57, 2013. ,
Improved side-channel collision attacks on AES, International Workshop on Selected Areas in Cryptography, p.29, 2007. ,
Multiple-differential side-channel collision attacks on AES, International Workshop on Cryptographic Hardware and Embedded Systems, p.29, 2008. ,
Heuristics of instability and stabilization in model selection, The annals of statistics 24, vol.6, p.137, 1996. ,
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction, English. In: Security, Privacy, and Applied Cryptography Engineering, vol.8804 ,
, , pp.183-200, 2014.
, , p.89
Less is more, International Workshop on Cryptographic Hardware and Embedded Systems, vol.73, p.62, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-02287177
Achieving side-channel high-order correlation immunity with leakage squeezing, Journal of Cryptographic Engineering, vol.4, p.45, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-02286851
Enhancing dimensionality reduction methods for side-channel attacks, International Conference on Smart Card Research and Advanced Applications ,
URL : https://hal.archives-ouvertes.fr/hal-01399580
, , vol.70, pp.15-33, 2015.
Kernel Discriminant Analysis for Information Extraction in the Presence of Masking, International Conference on Smart Card Research and Advanced Applications, pp.1-22, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01532186
, Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures -Profiling Attacks Without Pre-processing, vol.10529, pp.45-68, 2017.
Linear dimensionality reduction: survey, insights, and generalizations, In: Journal of Machine Learning Research, vol.16, issue.1, p.61, 2015. ,
Towards sound approaches to counteract poweranalysis attacks, Annual International Cryptology Conference, vol.87, pp.398-412, 1999. ,
A new LDA-based face recognition system which can solve the small sample size problem, Pattern Recognition, vol.33, p.63, 2000. ,
, , p.122
An efficient method for random delay generation in embedded software, Cryptographic Hardware and Embedded Systems-CHES 2009, p.156, 2009. ,
Analysis and improvement of the random delay countermeasure of CHES, International Workshop on Cryptographic Hardware and Embedded Systems, pp.95-109, 2009. ,
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits, IACR Cryptology ePrint Archive, p.62, 2014. ,
Efficient template attacks, Smart Card Research and Advanced Applications, vol.127, p.68, 2014. ,
Template attacks on different devices, International Workshop on Constructive Side-Channel Analysis and Secure Design, p.82, 2014. ,
Efficient, Portable Template Attacks, IEEE Transactions on Information Forensics and Security 13, vol.2, p.63, 2018. ,
Optimising kernel parameters and regularisation coefficients for non-linear discriminant analysis, The Journal of Machine Learning Research, vol.7, p.96, 2006. ,
Horizontal Correlation Analysis on Exponentiation, In: ICICS, vol.6476, p.30, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-02486982
ROSETTA for single trace analysis, Progress in Cryptology-INDOCRYPT 2012: 12th International Conference on Cryptology in India, vol.7668, p.29, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00776817
Simple power analysis on AES key expansion revisited, International Workshop on Cryptographic Hardware and Embedded Systems, p.29, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01218060
Higher-order side channel security and mask refreshing, International Workshop on Fast Software Encryption ,
, , p.43, 2013.
, Template Attacks
, Cryptographic Hardware and Embedded Systems -CHES, 2002.
Lecture Notes in Computer Science, vol.2523, p.41, 2003. ,
Support-vector networks, Machine learning, vol.20, p.57, 1995. ,
Higher-order threshold implementation of the AES S-box, International Conference on Smart Card Research and Advanced Applications, p.43, 2015. ,
Univariate side channel attacks and leakage modeling, Journal of Cryptographic Engineering, vol.1, issue.2, p.36, 2011. ,
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces, IACR Cryptology ePrint Archive, p.89, 2015. ,
Efficient removal of random delays from embedded software implementations using hidden markov models, International Conference on Smart Card Research and Advanced Applications, pp.123-140, 2012. ,
Efficient selection of time samples for higherorder DPA with projection pursuits, Constructive Side-Channel Analysis and Secure Design, vol.88, p.62, 2015. ,
Building a Side Channel Based Disassembler, English. In: Transactions on Computational Science X, vol.6340 ,
, , p.62, 2010.
An introduction to probability theory and its applications ,
The elements of statistical learning, Springer series in statistics, vol.1, p.137, 2001. ,
A statistical model for DPA with novel algorithmic confusion analysis, International Workshop on Cryptographic Hardware and Embedded Systems, p.35, 2012. ,
A projection pursuit algorithm for exploratory data analysis, IEEE Transactions on computers, vol.100, p.62, 1974. ,
Introduction to Statistical Pattern Recognition ,
The doubling attack-why upwards is better than downwards, International Workshop on Cryptographic Hardware and Embedded Systems, p.29, 2003. ,
URL : https://hal.archives-ouvertes.fr/inria-00563965
Uncertainty in deep learning, p.135, 2016. ,
, Deep Learning
Deep Learning. Adaptive computation and machine learning, p.111, 2016. ,
Stealing keys from PCs using a radio: Cheap electromagnetic attacks on windowed exponentiation, International Workshop on Cryptographic Hardware and Embedded Systems, pp.207-228, 2015. ,
ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs, Cryptographers' Track at the RSA Conference, pp.219-235, 2016. ,
Mutual information analysis, International Workshop on Cryptographic Hardware and Embedded Systems, p.36, 2008. ,
Revisiting higher-order DPA attacks, Cryptographers? Track at the RSA Conference, p.221, 2010. ,
Templates vs. stochastic methods, International Workshop on Cryptographic Hardware and Embedded Systems, vol.42, p.41, 2006. ,
Random-matrix theories in quantum physics: common concepts, Physics Reports, vol.299, p.69, 1998. ,
Electromagnetic analysis: Concrete results, Cryptographic Hardware and Embedded Systems -CHES 2001, pp.251-261, 2001. ,
DES and differential power analysis the ?Duplication? method, International Workshop on Cryptographic Hardware and Embedded Systems, vol.44, p.43, 1999. ,
Get your hands off my laptop: Physical side-channel key-extraction attacks on PCs, Journal of Cryptographic Engineering, vol.5, pp.95-112, 2015. ,
How Fast Can Higher-Order Masking Be in Software?, In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, p.43, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01494061
Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys, Cryptology ePrint Archive, 2018. ,
RSA key extraction via low-bandwidth acoustic cryptanalysis, International Cryptology Conference, pp.444-461, 2014. ,
Cryptanalysis of iterated block ciphers, p.35, 1996. ,
Improving neural networks by preventing co-adaptation of feature detectors, 2012. ,
Machine learning in side-channel analysis: a first study, English. In: Journal of Cryptographic Engineering, vol.1, pp.2190-8508, 2011. ,
, , p.57
Good is not good enough, International Workshop on Cryptographic Hardware and Embedded Systems, vol.37, p.36, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-02286943
Solving the small sample size problem of LDA, Proceedings. 16th International Conference on, 2002. ,
, , vol.3, p.63, 2002.
Intelligent Machine Homicide ,
, Constructive Side-Channel Analysis and Secure Design
Lecture Notes in Computer Science, vol.7275, p.57, 2012. ,
Instruction stream mutation for non-deterministic processors, Application-Specific Systems, Architectures and Processors, pp.286-295, 2002. ,
Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift, p.122, 2015. ,
Private circuits: Securing hardware against probing attacks, Annual International Cryptology Conference, pp.463-481, 2003. ,
On second-order differential power analysis, International Workshop on Cryptographic Hardware and Embedded Systems, p.44, 2005. ,
Very high order masking: Efficient implementation and security evaluation, International Conference on Cryptographic Hardware and Embedded Systems ,
, , p.43, 2017.
The Montgomery powering ladder, International Workshop on Cryptographic Hardware and Embedded Systems, p.27, 2002. ,
Side channel attacks on cryptographic devices as a classification problem, p.61, 2009. ,
Differential power analysis, Annual International Cryptology Conference, vol.35, p.30, 1999. ,
Introduction to differential power analysis, Journal of Cryptographic Engineering, vol.1, p.28, 2011. ,
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Annual International Cryptology Conference, vol.25, p.9, 1996. ,
ImageNet Classification with Deep Convolutional Neural Networks, Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems, vol.119, p.105, 2012. ,
Convolutional networks for images, speech, and time series, The handbook of brain theory and neural networks, vol.3361, p.115, 1995. ,
Power analysis attack: an approach based on machine learning, International Journal of Applied Cryptography, vol.3, p.57, 2014. ,
A machine learning approach against a masked AES, In: Journal of Cryptographic Engineering, vol.5, p.57, 2015. ,
A generalized optimal set of discriminant vectors, Pattern Recognition, vol.25, p.75, 1992. ,
Analyses et mesures avancées du rayonnement électromagnétique d'un circuit intégré, p.26, 2007. ,
Efficient BackProp, Neural Networks: Tricks of the Trade: Second Edition, p.111, 2012. ,
Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis), International Workshop on Constructive Side-Channel Analysis and Secure Design, p.57, 2015. ,
Loss Functions for Discriminative Training of Energy-Based Models, Proceedings of the Tenth International Workshop on Artificial Intelligence and Statistics, AISTATS 2005, p.111, 2005. ,
, Application of Attack Potential to SmartSmart, Version 2.9, p.15, 2013.
Data mining with decision trees: theory and applications ,
, World scientific, vol.81, p.57, 2014.
Enhancing collision attacks, International Workshop on Cryptographic Hardware and Embedded Systems, p.29, 2004. ,
How to estimate the success rate of higher-order side-channel attacks, International Workshop on Cryptographic Hardware and Embedded Systems, p.35, 2014. ,
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks, Cryptographic Hardware and Embedded Systems CHES, vol.8731, pp.35-54, 2014. ,
Behind the scene of side channel attacks, International Conference on the Theory and Application of Cryptology and Information Security, p.41, 2013. ,
Gaussian mixture models for higherorder side channel analysis, vol.87, 2007. ,
A time-delay neural network architecture for isolated word recognition, Neural networks, vol.3, p.105, 1990. ,
Using discriminant analysis for multi-class classification: an experimental investigation, Knowledge and Information Systems, vol.10, issue.4, p.96, 2006. ,
A simple power-analysis (SPA) attack on implementations of the AES key expansion, International Conference on Information Security and Cryptology, p.29, 2002. ,
Hardware countermeasures against DPA-a statistical analysis of their effectiveness, Topics in Cryptology-CT-RSA, vol.106, p.43, 2004. ,
PCA, Eigenvector Localization and Clustering for Side-Channel Attacks on Cryptographic Hardware Devices ,
Lecture Notes in Computer Science, Machine Learning and Knowledge Discovery in Databases, vol.7523, pp.253-268, 2012. ,
Profiling power analysis attack based on MLP in DPA contest V4. 2, Telecommunications and Signal Processing, 2016. ,
, , p.57, 2016.
Examining smart-card security under the threat of power analysis attacks, IEEE transactions on computers, vol.51, p.36, 2002. ,
Securing the AES finalists against power analysis attacks, International Workshop on Fast Software Encryption, p.43, 2000. ,
Using second-order power analysis to attack DPA resistant software, International Workshop on Cryptographic Hardware and Embedded Systems, p.44, 2000. ,
Direct Loss Minimization for Structured Prediction, Advances in Neural Information Processing Systems 23: 24th Annual Conference on Neural Information Processing Systems, p.113, 2010. ,
Optimization of power analysis using neural network, International Conference on Smart Card Research and Advanced Applications, p.57, 2013. ,
Non-deterministic processors, Australasian Conference on Information Security and Privacy, pp.115-129, 2001. ,
Profiling power analysis attack based on multi-layer perceptron network, Computational Problems in Science and Engineering, p.57, 2015. ,
Improving smart card security using self-timed circuits, Proceedings. Eighth International Symposium on, pp.211-218, 2002. ,
Balanced self-checking asynchronous logic for smart card applications, Microprocessors and Microsystems, vol.27, pp.421-430, 2003. ,
Power analysis attacks: Revealing the secrets of smart cards, vol.31, p.41, 2008. ,
Pushing the limits: a very compact and a threshold implementation of AES, Annual International Conference on the Theory and Applications of Cryptographic Techniques, p.43, 2011. ,
Methods of data storage and data storage systems. US3971916A. 1974 (cit, vol.8 ,
One for all-all for one: unifying standard differential power analysis attacks, IET Information Security, vol.5, p.36, 2011. ,
Breaking Cryptographic Implementations Using Deep Learning Techniques, International Conference on Security, Privacy, and Applied Cryptography Engineering, vol.131, p.57, 2016. ,
Innovative method of the power analysis, Radioengineering 22, vol.2, p.57, 2013. ,
DPA using phase-based waveform matching against random-delay countermeasure, Circuits and Systems, pp.1807-1810, 2007. ,
Rectified linear units improve restricted boltzmann machines, Proceedings of the 27th international conference on machine learning (ICML-10), vol.122, p.110, 2010. ,
Advanced Encryption Standard (AES), vol.197, 2001. ,
ChipWhisperer: An opensource platform for hardware embedded security research, Constructive Side-Channel Analysis and Secure Design, vol.94, p.77, 2014. ,
A side-channel analysis resistant description of the AES S-box, International Workshop on Fast Software Encryption, p.43, 2005. ,
Practical second-order DPA attacks for masked smart card implementations of block ciphers, Cryptographers? Track at the RSA Conference, p.44, 2006. ,
, Manifold Learning Towards Masking Implementations: A First Study. Cryptology ePrint Archive, p.85, 2017.
Practical template-algebraic side channel attacks with extremely low data complexity, Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, p.32, 2013. ,
A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks, Cryptographic Hardware and Embedded Systems CHES, vol.8731, p.32, 2014. ,
DPA Contest 4, p.69 ,
Some Formal Solutions in Side-channel Cryptanalysis-An Introduction, In: IACR Cryptology ePrint Archive, p.24, 2008. ,
Improved higher-order side-channel attacks with FPGA experiments, International Workshop on Cryptographic Hardware and Embedded Systems, p.44, 2005. ,
Template attack versus Bayes classifier, Journal of Cryptographic Engineering, vol.7, p.39, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01629884
Masked dual-rail pre-charge logic: DPA-resistance without routing constraints, International Workshop on Cryptographic Hardware and Embedded Systems, p.43, 2005. ,
Masking against side-channel attacks: A formal security proof, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.142-159, 2013. ,
Statistical Analysis of Second Order Differential Power Analysis, IEEE Trans. Computers, vol.58, p.44, 2009. ,
, Early Stopping -But When?" In: Neural Networks: Tricks of the Trade: Second Edition, p.111, 2012.
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database, Cryptology ePrint Archive, vol.136, p.131, 2018. ,
Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking), IET Information Security, vol.2, issue.1, p.44, 2008. ,
Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA, In: International Conference on Smart Card Research and Advanced Applications, p.120, 2017. ,
Electromagnetic analysis (ema): Measures and counter-measures for smart cards, Smart Card Programming and Security, pp.200-210, 2001. ,
Selecting Time Samples for Multivariate DPA Attacks". English. In: Cryptographic Hardware and Embedded Systems CHES 2012, vol.7428, pp.155-174, 2012. ,
, , vol.87
On the exact success rate of side channel analysis in the gaussian model, International Workshop on Selected Areas in Cryptography, p.35, 2008. ,
Cryptography and machine learning, International Conference on the Theory and Application of Cryptology, p.57, 1991. ,
Practical Template Attacks". English, Lecture Notes in Computer Science, vol.3325 ,
, , p.41, 2005.
Provably secure higher-order masking of AES, International Workshop on Cryptographic Hardware and Embedded Systems, p.43, 2010. ,
Algebraic Side-Channel Attacks, In: Inscrypt, vol.6151, p.31, 2009. ,
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21, vol.2, p.27, 1978. ,
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA, In: CHES, vol.5747, p.32, 2009. ,
Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, Cryptographic Hardware and Embedded Systems CHES, vol.5154, pp.411-425, 2008. ,
A collision-attack on AES, International Workshop on Cryptographic Hardware and Embedded Systems, p.29, 2004. ,
A stochastic model for differential side channel cryptanalysis, International Workshop on Cryptographic Hardware and Embedded Systems, p.127, 2005. ,
Fisher discriminant analysis with kernels, Neural networks for signal processing IX, vol.1, p.1, 1999. ,
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks ,
Lecture Notes in Computer Science, Advances in Cryptology -EUROCRYPT 2009, vol.5479, p.32, 2009. ,
Direct Loss Minimization for Training Deep Neural Nets, p.113, 2015. ,
Higher order masking of the AES, Cryptographers? Track at the RSA Conference, p.43, 2006. ,
Improving Non-Profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-Channel High-Resolution EM Measurements, Sixth International Workshop on Constructive Side-Channel Analysis and Secure Design, vol.69, p.62, 2015. ,
On the masking countermeasure and higher-order power analysis attacks, Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on, vol.1, p.44, 2005. ,
Nonlinear component analysis as a kernel eigenvalue problem, Neural computation, vol.10, pp.1299-1319, 1998. ,
Best Practices for Convolutional Neural Networks Applied to Visual Document Analysis, In: ICDAR, vol.3, pp.958-962, 2003. ,
A new class of collision attacks and its application to DES, International Workshop on Fast Software Encryption, p.29, 2003. ,
Efficient use of random delays in embedded software, IFIP International Workshop on Information Security Theory and Practices, p.122, 2007. ,
, Machine Learning, p.47, 1997.
Portable data carrier including a microprocessor. US4211919A. 1977 (cit, vol.8 ,
Shuffling against side-channel attacks: A comprehensive study with cautionary note, International Conference on the Theory and Application of Cryptology and Information Security ,
, , p.43, 2012.
Mutual information analysis: how, when and why?, In: Cryptographic Hardware and Embedded Systems-CHES 2009, p.36, 2009. ,
Soft Analytical Side-Channel Attacks, IACR Cryptology ePrint Archive, p.32, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01096218
No free lunch theorems for optimization, IEEE transactions on evolutionary computation, vol.1, issue.1, p.56, 1997. ,
Towards Efficient Second-Order Power Analysis, Cryptographic Hardware and Embedded Systems -CHES 2004 ,
, Lecture Notes in Computer Science, vol.3156, p.44, 2004.
Multi-class support vector machines, p.57, 1998. ,
Improving differential power analysis by elastic alignment, Cryptographersí Track at the RSA Conference, pp.104-119, 2011. ,
A direct LDA algorithm for high-dimensional data with application to face recognition, Pattern Recognition, vol.34, pp.2067-2070, 2001. ,
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher, International Conference on Smart Card Research and Advanced Applications, vol.102, p.85, 2017. ,