Statistical Tools



In this chapter, we discuss different statistical methods ranging from the simple difference of mean test to a principal subspaces multivariate template attack.


Manifold Covariance Ghost Hone 


  1. [APSQ06]
    Archambeau, C., Peeters, E., Standaert, F.-X., & Quisquater, J.-J. (2006). Template attacks in principal subspaces. In Cryptographic Hardware and Embedded Systems—Proceedings of CHES 2006, Springer.Google Scholar
  2. [ARR03]
    Agrawal, D., Rao, J. R., & Rohatgi, P. (2003). Multi-channel attacks. In C. D. Walter, Ç. K. Koç, & C. Paar (Eds.), CHES, Lecture Notes in Computer Science, (Vol. 2779, pp. 2–16). Springer.Google Scholar
  3. [BCO04]
    Brier, E., Clavier, C., & Olivier, F. (2004) Correlation power analysis with a leakage model. In Joye and Quisquater [JQ04], (pp. 16–29).Google Scholar
  4. [BR]
    Barreto, P., & Rijmen, V. The khazad legacy-level block cipher. In First open NESSIE Workshop, KU-Leuven, 2000. Submission to NESSIE.Google Scholar
  5. [BS90]
    Biham, E., & Shamir, A. (1990). Differential cryptanalysis of des-like cryptosystems. In A. Menezes & S. A. Vanstone (Eds.), CRYPTO, Lecture Notes in Computer Science, (Vol. 537, pp. 2–21). Springer.Google Scholar
  6. [CNK04]
    Coron, J.-S., Naccache, D., & Kocher, P. (2004). Statistics and secret leakage. ACM Transactions in Embedded Computing Systems, 3(3), 492–508.Google Scholar
  7. [CRR02]
    Chari, S., Rao, J. R., & Rohatgi, P. (2002). Template attacks. In B. S. Kaliski Jr., Ç. K. Koç & C. Paar (Eds.), CHES, Lecture Notes in Computer Science, (Vol. 2523, pp. 13–28). Springer.Google Scholar
  8. [ET93]
    Efron, B, & Tibshirani, R. (1993). An Introduction to the Bootstrap. Monographs on Statistics & Applied Probability, Number ISBN: 9780412042317, ICCN: 93004489, Chapman & Hall.
  9. [Fuk90]
    Fukunaga, K. (1990). Introduction to statistical pattern recognition. New York: Elsevier.Google Scholar
  10. [Hal52]
    Hald, A. (1952). Statistical Theory with Engineering Applications. Wiley publications in statistics, Number ICCN: 52011060, Wiley.
  11. [Jol86]
    Jolliffe, I. T. (1986). Principal component analysis. New York: Springer.Google Scholar
  12. [JPS05]
    Joye, M., Paillier, P., & Schoenmakers, B. (2005). On second-order differential power analysis. In J. R. Rao & B. Sunar (Eds.), CHES, Lecture Notes in Computer Science, (Vol. 3659, pp. 293–308). Springer.Google Scholar
  13. [JQ04]
    Joye, M., & Quisquater, J.-J. (Eds.). (2004). Cryptographic hardware and embedded systems. In CHES 2004: Proceedings of 6th International Workshop Cambridge, MA, USA, August 11–13, 2004, Lecture Notes in Computer Science, (Vol. 3156). Springer.Google Scholar
  14. [KJJ99]
    Kocher, P. C., Jaffe, J., & Jun, B. (1999). Differential power analysis. In M. J. Wiener (Ed.), CRYPTO, Lecture Notes in Computer Science, (Vol. 1666, pp. 388–397). Springer.Google Scholar
  15. [Man04]
    Mangard, S. (2004). Hardware countermeasures against DPA ? A statistical analysis of their effectiveness. In T. Okamoto (Ed.), CT-RSA, Lecture Notes in Computer Science, (Vol. 2964, pp. 222–235). Springer.Google Scholar
  16. [Mat93]
    Matsui, M. (1993). Linear cryptoanalysis method for DES Cipher. In EUROCRYPT, (pp. 386–397).Google Scholar
  17. [MDS+99]
    Messerges, T. S., Dabbish, E. A., Sloan, R. H., Messerges, T. S., Dabbish, E. A., Sloan, R. H. (1999). Investigations of power analysis attacks on smartcards. In USENIX Workshop on Smartcard Technology, (pp. 151–162).Google Scholar
  18. [MPG05]
    Mangard, S., Popp, T., & Gammel, B. M. (2005). Side-channel leakage of masked CMOS gates. In A. Menezes (Ed.), CT-RSA, Lecture Notes in Computer Science, (Vol. 3376, pp. 351–365). Springer.Google Scholar
  19. [RO04]
    Rechberger, C., & Oswald, E. (2004). Practical template attacks. In C. H. Lim & M. Yung (Eds.), WISA, Lecture Notes in Computer Science, (Vol. 3325, pp. 440–456). Springer.Google Scholar
  20. [SÖP04]
    Standaert, F.-X., S. B. Örs, & Preneel, B. (2004) Power analysis of an FPGA: Implementation of Rijndael: Is pipelining a DPA countermeasure? In Joye and Quisquater [JQ04], (pp. 30–44).Google Scholar
  21. [SPRQ06]
    Standaert, F.-X., Peeters, E., Rouvroy, G., & Quisquater, J.-J. (2006). An overview of power analysis attacks against field programmable gate arrays: A survey. Proceedings of the IEEE, 94(2), 383–394.Google Scholar
  22. [TP91]
    Turk, M., & Pentland, A. (1991). Eigenfaces for recognition. Journal of Cognitive Neuroscience, 3(1), 71–86.Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Texas Instruments Inc.FriscoUSA

Personalised recommendations