Advertisement

Statistical Tools

  • Eric Peeters
Chapter

Abstract

In this chapter, we discuss different statistical methods ranging from the simple difference of mean test to a principal subspaces multivariate template attack.

Keywords

Clock Cycle Principal Direction Gaussian Random Variable Block Cipher Leakage Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [APSQ06]
    Archambeau, C., Peeters, E., Standaert, F.-X., & Quisquater, J.-J. (2006). Template attacks in principal subspaces. In Cryptographic Hardware and Embedded Systems—Proceedings of CHES 2006, Springer.Google Scholar
  2. [ARR03]
    Agrawal, D., Rao, J. R., & Rohatgi, P. (2003). Multi-channel attacks. In C. D. Walter, Ç. K. Koç, & C. Paar (Eds.), CHES, Lecture Notes in Computer Science, (Vol. 2779, pp. 2–16). Springer.Google Scholar
  3. [BCO04]
    Brier, E., Clavier, C., & Olivier, F. (2004) Correlation power analysis with a leakage model. In Joye and Quisquater [JQ04], (pp. 16–29).Google Scholar
  4. [BR]
    Barreto, P., & Rijmen, V. The khazad legacy-level block cipher. In First open NESSIE Workshop, KU-Leuven, 2000. Submission to NESSIE.Google Scholar
  5. [BS90]
    Biham, E., & Shamir, A. (1990). Differential cryptanalysis of des-like cryptosystems. In A. Menezes & S. A. Vanstone (Eds.), CRYPTO, Lecture Notes in Computer Science, (Vol. 537, pp. 2–21). Springer.Google Scholar
  6. [CNK04]
    Coron, J.-S., Naccache, D., & Kocher, P. (2004). Statistics and secret leakage. ACM Transactions in Embedded Computing Systems, 3(3), 492–508.Google Scholar
  7. [CRR02]
    Chari, S., Rao, J. R., & Rohatgi, P. (2002). Template attacks. In B. S. Kaliski Jr., Ç. K. Koç & C. Paar (Eds.), CHES, Lecture Notes in Computer Science, (Vol. 2523, pp. 13–28). Springer.Google Scholar
  8. [ET93]
    Efron, B, & Tibshirani, R. (1993). An Introduction to the Bootstrap. Monographs on Statistics & Applied Probability, Number ISBN: 9780412042317, ICCN: 93004489, Chapman & Hall. http://books.google.fr/books?id=gLlpIUxRntoC
  9. [Fuk90]
    Fukunaga, K. (1990). Introduction to statistical pattern recognition. New York: Elsevier.Google Scholar
  10. [Hal52]
    Hald, A. (1952). Statistical Theory with Engineering Applications. Wiley publications in statistics, Number ICCN: 52011060, Wiley. http://books.google.com/books?id=4-9QAAAAMAAJ
  11. [Jol86]
    Jolliffe, I. T. (1986). Principal component analysis. New York: Springer.Google Scholar
  12. [JPS05]
    Joye, M., Paillier, P., & Schoenmakers, B. (2005). On second-order differential power analysis. In J. R. Rao & B. Sunar (Eds.), CHES, Lecture Notes in Computer Science, (Vol. 3659, pp. 293–308). Springer.Google Scholar
  13. [JQ04]
    Joye, M., & Quisquater, J.-J. (Eds.). (2004). Cryptographic hardware and embedded systems. In CHES 2004: Proceedings of 6th International Workshop Cambridge, MA, USA, August 11–13, 2004, Lecture Notes in Computer Science, (Vol. 3156). Springer.Google Scholar
  14. [KJJ99]
    Kocher, P. C., Jaffe, J., & Jun, B. (1999). Differential power analysis. In M. J. Wiener (Ed.), CRYPTO, Lecture Notes in Computer Science, (Vol. 1666, pp. 388–397). Springer.Google Scholar
  15. [Man04]
    Mangard, S. (2004). Hardware countermeasures against DPA ? A statistical analysis of their effectiveness. In T. Okamoto (Ed.), CT-RSA, Lecture Notes in Computer Science, (Vol. 2964, pp. 222–235). Springer.Google Scholar
  16. [Mat93]
    Matsui, M. (1993). Linear cryptoanalysis method for DES Cipher. In EUROCRYPT, (pp. 386–397).Google Scholar
  17. [MDS+99]
    Messerges, T. S., Dabbish, E. A., Sloan, R. H., Messerges, T. S., Dabbish, E. A., Sloan, R. H. (1999). Investigations of power analysis attacks on smartcards. In USENIX Workshop on Smartcard Technology, (pp. 151–162).Google Scholar
  18. [MPG05]
    Mangard, S., Popp, T., & Gammel, B. M. (2005). Side-channel leakage of masked CMOS gates. In A. Menezes (Ed.), CT-RSA, Lecture Notes in Computer Science, (Vol. 3376, pp. 351–365). Springer.Google Scholar
  19. [RO04]
    Rechberger, C., & Oswald, E. (2004). Practical template attacks. In C. H. Lim & M. Yung (Eds.), WISA, Lecture Notes in Computer Science, (Vol. 3325, pp. 440–456). Springer.Google Scholar
  20. [SÖP04]
    Standaert, F.-X., S. B. Örs, & Preneel, B. (2004) Power analysis of an FPGA: Implementation of Rijndael: Is pipelining a DPA countermeasure? In Joye and Quisquater [JQ04], (pp. 30–44).Google Scholar
  21. [SPRQ06]
    Standaert, F.-X., Peeters, E., Rouvroy, G., & Quisquater, J.-J. (2006). An overview of power analysis attacks against field programmable gate arrays: A survey. Proceedings of the IEEE, 94(2), 383–394.Google Scholar
  22. [TP91]
    Turk, M., & Pentland, A. (1991). Eigenfaces for recognition. Journal of Cognitive Neuroscience, 3(1), 71–86.Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Texas Instruments Inc.FriscoUSA

Personalised recommendations