Practical two-dimensional correlation power analysis and its backward fault-tolerance

This is a preview of subscription content, access via your institution.

References

  1. 1

    Kocher P. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: CRYPTO 1996, Lecture Notes in Computer Science, vol. 1109. New York: Springer, 1996. 104–113

    Google Scholar 

  2. 2

    Kocher P, Jaffe J, Jun B. Differential power analysis. In: CRYPTO 1999, Lecture Notes in Computer Science, vol. 1666. New York: Springer, 1999. 388–397

    Google Scholar 

  3. 3

    Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model. In: CHES 2004, Lecture Notes in Computer Science, vol. 3156. New York: Springer, 2004. 16–29

    Google Scholar 

  4. 4

    Chari S, Rao J R, Rohatgi P. Template attacks. In: CHES 2002, Lecture Notes in Computer Science, vol. 2523. New York: Springer, 2003. 13–28

    Google Scholar 

  5. 5

    Schramm K, Wollinger T, Paar C. A new class of collision attacks and its application to DES. In: FSE 2003, Lecture Notes in Computer Science, vol. 2887. New York: Springer, 2003. 206–222

    Google Scholar 

  6. 6

    Wang A, Wang Z Y, Zheng X X, et al. Efficient collision attacks on smart card implementations of masked AES. Sci China Inf Sci, 2015, 58: 052107

    Google Scholar 

  7. 7

    Gierlichs B, Batina L, Tuyls P, et al. Mutual information analysis. In: CHES 2008, Lecture Notes in Computer Science, vol. 5154. New York: Springer, 2008. 426–442

    Google Scholar 

  8. 8

    Oswald D, Paar C. Improving side-channel analysis with optimal linear transforms. In: Smart Card Research and Advanced Applications 2013, Lecture Notes in Computer Science, vol. 7771. New York: Springer, 2013. 219–233

    Google Scholar 

  9. 9

    Bogdanov A, Kizhvatov I. Beyond the limits of DPA: combined side-channel collision attacks. IEEE Trans Comput, 2012, 61: 1153–1164

    MathSciNet  Article  Google Scholar 

  10. 10

    Veyrat-Charvillon N, Gerard B, Standaert F X. Soft analytical side-channel attacks. In: ASIACRYPT 2014, Lecture Notes in Computer Science, vol. 8873. New York: Springer, 2014. 282–296

    Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61402252, 61402536), Beijing Natural Science Foundation (Grant No. 4162053), Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-14-006), and Beijing Institute of Technology Research Fund Program for Young Scholars.

Author information

Affiliations

Authors

Corresponding author

Correspondence to Liehuang Zhu.

Additional information

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Wang, A., Hu, W., Tian, W. et al. Practical two-dimensional correlation power analysis and its backward fault-tolerance. Sci. China Inf. Sci. 60, 068101 (2017). https://doi.org/10.1007/s11432-016-0398-y

Download citation