Template Attacks in Principal Subspaces, CHES, vol.4249, pp.1-14, 2006. ,
Improved Template Attacks, COSADE, pp.81-89, 2010. ,
,
NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage, International Symposium on Electromagnetic Compatibility (EMC '14 / Tokyo, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-02412040
Side-channel Leakage and Trace Compression Using Normalized Inter-class Variance, Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy, HASP '14, vol.7, pp.1-7, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-02412117
Correlation power analysis with a leakage model, Cryptographic Hardware and Embedded Systems -CHES 2004: 6th International Workshop Cambridge, vol.3156, pp.16-29, 2004. ,
URL : https://hal.archives-ouvertes.fr/hal-02487026
Less is More -Dimensionality Reduction from a Theoretical Perspective, Cryptographic Hardware and Embedded Systems -CHES 2015 -17th International Workshop, vol.9293, pp.22-41, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-02287177
Annelie Heuser, Damien Marion, and Olivier Rioul. Optimal side-channel attacks for multivariate leakages and multiple models, J. Cryptographic Engineering, vol.7, issue.4, pp.331-341, 2017. ,
Masks Will Fall Off -Higher-Order Optimal Distinguishers ,
URL : https://hal.archives-ouvertes.fr/hal-02287072
, Advances in Cryptology -ASIACRYPT 2014 -20th International Conference on the Theory and Application of Cryptology and Information Security, vol.8874, pp.344-365, 2014.
Template attacks, Cryptographic Hardware and Embedded Systems -CHES 2002, 4th International Workshop, vol.2523, pp.13-28, 2002. ,
Efficient template attacks, Smart Card Research and Advanced Applications -12th International Conference, vol.8419, pp.253-270, 2013. ,
Differential Power Analysis in the Presence of Hardware Countermeasures, Lecture Notes in Computer Science, vol.1965, pp.252-263, 2000. ,
URL : https://hal.archives-ouvertes.fr/hal-02487059
On Boolean and Arithmetic Masking against Differential Power Analysis, CHES, pp.231-237, 1965. ,
, , 2000.
An efficient method for random delay generation in embedded software, Cryptographic Hardware and Embedded Systems -CHES 2009, 11th International Workshop, Lausanne, vol.5747, pp.156-170, 2009. ,
Conversion of Security Proofs from One Model to Another: A New Issue, COSADE, 2012. ,
On the optimality and practicability of mutual information analysis in some scenarios. Cryptography and Communications, 2017. ,
Wavelet transform based preprocessing for side channel analysis, 45th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2012, Workshops Proceedings, pp.32-38, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-02411932
Loïc van Oldeneel tot Oldenzeel, and Nicolas Veyrat-Charvillon. Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models, Lecture Notes in Computer Science, vol.7771, pp.123-140, 2012. ,
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator, Progress in Cryptology -AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, vol.6055, pp.243-260, 2010. ,
Hvien, Damien Marion, and Thomas Perianin. Binary Data Analysis for Source Code Leakage Assessment, 11th International Conference, vol.01, pp.391-409, 2018. ,
How to Choose Interesting Points for Template Attacks More Effectively?, Trusted Systems -6th International Conference, vol.9473, pp.168-183, 2014. ,
Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition, Innovative Security Solutions for Information Technology and Communications -10th International Conference, vol.10543, pp.12-27, 2017. ,
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication -5th IFIP WG 11.2 International Workshop, Proceedings, pp.100-115, 2011. ,
Spectral Approach for Correlation Power Analysis, Codes, Cryptology and Information Security -Second International Conference, C2SI 2017, vol.10194, pp.238-253, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01652010
Reaching the limit of nonprofiling DPA, IEEE Trans. on CAD of Integrated Circuits and Systems, vol.34, issue.6, pp.915-927, 2015. ,
Principal Component Analysis, Springer Series in Statistics, p.387954422, 2002. ,
On Second-Order Differential Power Analysis, CHES, vol.3659, pp.293-308, 2005. ,
Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis), Constructive Side-Channel Analysis and Secure Design -6th International Workshop, pp.20-33, 2015. ,
Behind the Scene of Side Channel Attacks, Lecture Notes in Computer Science, vol.8269, issue.1, pp.506-525, 2013. ,
On the Use of Independent Component Analysis to Denoise Side-Channel Measurements, Constructive Side-Channel Analysis and Secure Design -9th International Workshop, vol.10815, pp.61-81, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01973322
Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006. ,
Securing the AES Finalists Against Power Analysis Attacks, Fast Software Encryption'00, pp.150-164, 2000. ,
Securing the AES finalists against power analysis attacks, Fast Software Encryption, 7th International Workshop, vol.1978, pp.150-164, 2000. ,
Examining Smart-Card Security under the Threat of Power Analysis Attacks, IEEE Trans. Computers, vol.51, issue.5, pp.541-552, 2002. ,
Power consumption traces realignment to improve differential power analysis, DDECS, pp.201-206, 2011. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00592005
Template Attacks on Masking -Resistance Is Futile, Lecture Notes in Computer Science, vol.4377, pp.243-256, 2007. ,
Statistical Analysis of Second Order Differential Power Analysis, IEEE Trans. Computers, vol.58, issue.6, pp.799-811, 2009. ,
A Stochastic Model for Differential Side Channel Cryptanalysis, LNCS, vol.3659, pp.30-46, 2005. ,
Higher Order Masking of the AES, LNCS, vol.3860, pp.208-225, 2006. ,
Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, CHES, pp.411-425 ,
, , 2008.
, ASIACRYPT, vol.6477, pp.112-129, 2010.
Improving Differential Power Analysis by Elastic Alignment, Lecture Notes in Computer Science, vol.6558, pp.104-119, 2011. ,
Multiplying matrices faster than coppersmith-winograd, STOC'12 Proceedings of the fortyfourth annual ACM symposium on Theory of computing, pp.887-898, 2012. ,
How many interesting points should be used in a template attack, Journal of Systems and Software, vol.120, pp.105-113, 2016. ,
Mahalanobis distance similarity measure based distinguisher for template attack. Security and Communication Networks, vol.8, pp.769-777, 2015. ,
How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice?, Information and Communications Security -16th International Conference, ICICS 2014, vol.8958, pp.200-214, 2014. ,