Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers
- 1 January 2006
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 192-207
- https://doi.org/10.1007/11605805_13
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Improved Higher-Order Side-Channel Attacks with FPGA ExperimentsLecture Notes in Computer Science, 2005
- On Second-Order Differential Power AnalysisLecture Notes in Computer Science, 2005
- On the masking countermeasure and higher-order power analysis attacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Two Power Analysis Attacks against One-Mask MethodsLecture Notes in Computer Science, 2004
- Towards Efficient Second-Order Power AnalysisLecture Notes in Computer Science, 2004
- Hardware Countermeasures against DPA – A Statistical Analysis of Their EffectivenessLecture Notes in Computer Science, 2004
- Differential Power Analysis in the Presence of Hardware CountermeasuresLecture Notes in Computer Science, 2000
- Using Second-Order Power Analysis to Attack DPA Resistant SoftwareLecture Notes in Computer Science, 2000
- Towards Sound Approaches to Counteract Power-Analysis AttacksLecture Notes in Computer Science, 1999
- Differential Power AnalysisLecture Notes in Computer Science, 1999