Show simple item record

hal.structure.identifierDMI
dc.contributor.authorCLAVIER, Christophe
hal.structure.identifierDMI
dc.contributor.authorFEIX, Benoit
hal.structure.identifierDMI
dc.contributor.authorGAGNEROT, Georges
hal.structure.identifierInside Secure
dc.contributor.authorROUSSELLET, Mylène
hal.structure.identifierInside Secure
hal.structure.identifierLithe and fast algorithmic number theory [LFANT]
hal.structure.identifierInstitut de Mathématiques de Bordeaux [IMB]
dc.contributor.authorVERNEUIL, Vincent
dc.date.accessioned2024-04-04T02:26:34Z
dc.date.available2024-04-04T02:26:34Z
dc.date.issued2011-09
dc.date.conference2011-09-28
dc.identifier.urihttps://oskar-bordeaux.fr/handle/20.500.12278/189958
dc.description.abstractEnThe recent results presented by Moradi et al. on AES at CHES 2010 and Witteman et al. on square-and-multiply always RSA exponentiation at CT-RSA 2011 have shown that collision-correlation power analysis is able to recover the secret keys on embedded implementations. However, we noticed that the attack published last year by Moradi et al. is not efficient on correctly first-order protected implementations. We propose in this paper improvements on collision-correlation attacks which require less power traces than classical second-order power analysis techniques. We present here two new methods and show in practice their real efficiency on two first-order protected AES implementations. We also mention that other symmetric embedded algorithms can be targeted by our new techniques.
dc.language.isoen
dc.publisherSpringer
dc.subject.enAES
dc.subject.enSide Channel Analysis
dc.subject.enCollision
dc.subject.enCorrelation
dc.subject.enDPA
dc.subject.enMasking
dc.title.enImproved Collision-Correlation Power Analysis on First Order Protected AES
dc.typeCommunication dans un congrès
dc.identifier.doi10.1007/978-3-642-23951-9_4
dc.subject.halInformatique [cs]/Cryptographie et sécurité [cs.CR]
bordeaux.page49-62
bordeaux.volume6917
bordeaux.hal.laboratoriesInstitut de Mathématiques de Bordeaux (IMB) - UMR 5251*
bordeaux.institutionUniversité de Bordeaux
bordeaux.institutionBordeaux INP
bordeaux.institutionCNRS
bordeaux.conference.titleWorkshop on Cryptographic Hardware and Embedded Systems - CHES 2011
bordeaux.countryJP
bordeaux.conference.cityNara
bordeaux.peerReviewedoui
hal.identifierinria-00633527
hal.version1
hal.invitednon
hal.proceedingsoui
hal.conference.end2011-10-01
hal.popularnon
hal.audienceInternationale
hal.origin.linkhttps://hal.archives-ouvertes.fr//inria-00633527v1
bordeaux.COinSctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.date=2011-09&rft.volume=6917&rft.spage=49-62&rft.epage=49-62&rft.au=CLAVIER,%20Christophe&FEIX,%20Benoit&GAGNEROT,%20Georges&ROUSSELLET,%20Myl%C3%A8ne&VERNEUIL,%20Vincent&rft.genre=unknown


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record