Improved Techniques for Side-Channel Analysis

References

  1. 1.
    O. Aciicmez, Ç. K. Koç, and J.-P. Seifert. Predicting secret keys via branch prediction. In M. Abe editor, Topics in Cryptology CT-RSA 2007, The Cryptographers Track at the RSA Conference 2007, pp. 225–242, Springer-Verlag, Lecture Notes in Computer Science series 4377, 2007.Google Scholar
  2. 2.
    D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi. The EM side-channel(s). In B. Kaliski, Ç. K. Koç, and C. Paar editors, Proceedings of CHES 2002. Lecture Notes in Computer Science, vol. 2523, pp. 29–45, Springer, 2002.Google Scholar
  3. 3.
    D. Agrawal, J. R. Rao, P. Rohatgi, and K. Schramm. Templates as Master Keys. In J. R. Rao and B. Sunar editors, Proceedings of CHES 2005, Lecture Notes in Computer Science, vol. 3659, pp. 15–29, Springer, 2005.Google Scholar
  4. 4.
    D. Asinov and R. Agrawal. Keyboard acoustic emanations. In Proceeding of the IEEE Symposium on Security and Privacy 2004, pp. 3–11, 2004.Google Scholar
  5. 5.
    D. J. Bernstein. Cache-timing attacks on AES. Technical Report, p. 37, April 2005, available at http://cr.yp.to/antiforgery/cachetiming- 20050414.pdf
  6. 6.
    S. Chari, J. R. Rao, and P. Rohatgi. Template attacks. In B. Kaliski, Ç. K. Koç, and C. Paar editors, Proceedings of CHES 2002, Lecture Notes in Computer Science, vol. 2523, pp. 13–28 Springer, 2002.Google Scholar
  7. 7.
    K. Gandolfi, C. Mourtel, and F. Olivier. Electromagnetic analysis: Concrete results. In Ç. K. Koç, D. Naccache, and C. Paar editors, Proceedings of CHES 2001, Lecture Notes in Computer Science, vol. 2162, pp. 251–261, Springer, 2001.Google Scholar
  8. 8.
    P. C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In N. Koblitz editor, Advances in Cryptology – CRYPTO ’96, Lecture Notes in Computer Science, vol. 1109, pp. 104–113, Springer-Verlag, 1996.Google Scholar
  9. 9.
    P. C. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In M. Wiener editor, Proceedings of Advances in Cryptology CRYPTO ’99, Lecture Notes in Computer Science, vol. 1666, pp. 388–397, Springer-Verlag, 1999.Google Scholar
  10. 10.
    M. Kuhn. Optical Time-domain eavesdropping risks of CRT displays. In Proceedings of the Symposium on Security and Privacy, pp. 3–18, 2002.Google Scholar
  11. 11.
    J. Loughry and D. Umphress. Information leakage from optical emanations. In ACM Transactions on Information and System Security, vol. 5, pp. 262–289, 2002.CrossRefGoogle Scholar
  12. 12.
    D. A. Osvik, A. Shamir, and E. Tromer. Cache attacks and countermeasures: The case of AES. In D. Pointcheval editor, Topics in Cryptology CT-RSA 2006, The Cryptographers Track at the RSA Conference 2006, pp. 1–20, Lecture Notes in Computer Science, vol. 3860, Springer-Verlag, 2006.CrossRefGoogle Scholar
  13. 13.
    C. Percival. Cache missing for fun and profit. In BSDCan 2005, Ottawa, 2005, available at http://www.daemonology.net/hyperthreading-considered-harmful/
  14. 14.
    J.-J. Quisquater and D. Samyde. Electromagnetic analysis (EMA): Measures and countermeasures for smart cards. In Proceedings of e-Smart 2001, Lectures Notes in Computer Science (LNCS), vol. 2140, pp. 200–210, Springer, 2001.Google Scholar
  15. 15.
    H. L. Van Trees. Detection, Estimation, and Modulation Theory, Part I. John Wiley & Sons, New York, 1968.MATHGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  1. 1.IBM T. J. Watson Research CenterAmerica

Personalised recommendations