SLIDE 16 References
[1] Junrong Liu, Yu Yu, Fran¸ cois-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, and Xinjun Xie, Small tweaks do not help: Differential power analysis of MILENAGE implementations in 3G/4G USIM cards, in G¨ unther Pernul, Peter Y. A. Ryan, and Edgar R. Weippl, editors, Computer Security
- ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria,
September 21-25, 2015, Proceedings, Part I, volume 9326 of Lecture Notes in Computer Science, pages 468?480. Springer, 2015. [2] Daniel J. Bernstein, Tanja Lange, and Christine van Vredendaal, Tighter, faster, simpler side-channel security evaluations beyond computing power in IACR Cryptology ePrint Archive, 2015:221, 2015. [3] Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Sch¨ uth, and Fran¸ cois-Xavier Standaert, Simpler and more efficient rank estimation for side-channel security assessment, in Gregor Leander, editor, Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8- 11, 2015, Revised Selected Papers, volume 9054 of Lecture Notes in Computer Science, pages 117?129. Springer, 2015. [4] Daniel P. Martin, Jonathan F. O’Connell, Elisabeth Oswald, and Martijn Stam, Counting keys in par- allel after a side channel attack, in Tetsu Iwata and Jung Hee Cheon, editors, Advances in Cryptology
- ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and
Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II, volume 9453 of Lecture Notes in Computer Science, pages 313?337. Springer, 2015. [5] Nicolas Veyrat-Charvillon, Benoˆ ıt G´ erard, and Fran¸ cois-Xavier Standaert, Security evaluations beyond computing power, in Thomas Johansson and Phong Q. Nguyen, editors, Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryp- tographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, volume 7881 of Lecture Notes in Computer Science, pages 126?141. Springer, 2013. [6] Marios O. Choudary and P. G. Popescu, Back to massey: Impressively fast, scalable and tight security evaluation tools, in Wieland Fischer and Naofumi Homma, editors, Cryptographic Hardware and Em- bedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings, volume 10529 of Lecture Notes in Computer Science, pages 367?386. Springer, 2017. [7] Romain Poussier, Fran¸ cois-Xavier Standaert, and Vincent Grosso, Simple key enumeration (and rank estimation) using histograms: An integrated approach, in Benedikt Gierlichs and Axel Y. Poschmann, editors, Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings, volume 9813 of Lecture Notes in Computer Science, pages 61?81. Springer, 2016.
“A Leakage Trace Collection Approach for Arbitrary Cryptographic IP Cores”, Athanassios Moschos, Apostolos Fournaris and Nicolas Sklavos
As the need for security in ubiquitous computing systems becomes evident, many such devices are equipped with hardware security tokens featuring cryptographic IP cores. Such tokens and their IP core tend to leak sensitive information that if collected can reveal such information using Side Channel Analysis Attacks (SCAs). To evaluate such systems against SCAs and overall leakage, security engineers must collect a considerable amount of DUT leakage traces, to grade the applicability of popular SCAs like Differential Power Analysis (DPA), Correlation DPA [1] or Mutual Information Analysis (MIA) [2], as well as perform information theoretic leakage/vulnerability tests (mutual information tests or leakage statistic order t- tests/Welch t-tests).
15