Skip to main content
Log in

Practical two-dimensional correlation power analysis and its backward fault-tolerance

  • Highlight
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Kocher P. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: CRYPTO 1996, Lecture Notes in Computer Science, vol. 1109. New York: Springer, 1996. 104–113

    Google Scholar 

  2. Kocher P, Jaffe J, Jun B. Differential power analysis. In: CRYPTO 1999, Lecture Notes in Computer Science, vol. 1666. New York: Springer, 1999. 388–397

    Google Scholar 

  3. Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model. In: CHES 2004, Lecture Notes in Computer Science, vol. 3156. New York: Springer, 2004. 16–29

    Google Scholar 

  4. Chari S, Rao J R, Rohatgi P. Template attacks. In: CHES 2002, Lecture Notes in Computer Science, vol. 2523. New York: Springer, 2003. 13–28

    Google Scholar 

  5. Schramm K, Wollinger T, Paar C. A new class of collision attacks and its application to DES. In: FSE 2003, Lecture Notes in Computer Science, vol. 2887. New York: Springer, 2003. 206–222

    Google Scholar 

  6. Wang A, Wang Z Y, Zheng X X, et al. Efficient collision attacks on smart card implementations of masked AES. Sci China Inf Sci, 2015, 58: 052107

    Google Scholar 

  7. Gierlichs B, Batina L, Tuyls P, et al. Mutual information analysis. In: CHES 2008, Lecture Notes in Computer Science, vol. 5154. New York: Springer, 2008. 426–442

    Google Scholar 

  8. Oswald D, Paar C. Improving side-channel analysis with optimal linear transforms. In: Smart Card Research and Advanced Applications 2013, Lecture Notes in Computer Science, vol. 7771. New York: Springer, 2013. 219–233

    Google Scholar 

  9. Bogdanov A, Kizhvatov I. Beyond the limits of DPA: combined side-channel collision attacks. IEEE Trans Comput, 2012, 61: 1153–1164

    Article  MathSciNet  Google Scholar 

  10. Veyrat-Charvillon N, Gerard B, Standaert F X. Soft analytical side-channel attacks. In: ASIACRYPT 2014, Lecture Notes in Computer Science, vol. 8873. New York: Springer, 2014. 282–296

    Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61402252, 61402536), Beijing Natural Science Foundation (Grant No. 4162053), Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-14-006), and Beijing Institute of Technology Research Fund Program for Young Scholars.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liehuang Zhu.

Additional information

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, A., Hu, W., Tian, W. et al. Practical two-dimensional correlation power analysis and its backward fault-tolerance. Sci. China Inf. Sci. 60, 068101 (2017). https://doi.org/10.1007/s11432-016-0398-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-016-0398-y

Navigation