2014
DOI: 10.1007/978-3-319-08302-5_8
|View full text |Cite
|
Sign up to set email alerts
|

Time-Frequency Analysis for Second-Order Attacks

Abstract: Second-order side-channel attacks are used to break firstorder masking protections. A practical reason which often limits the efficiency of second-order attacks is the temporal localisation of the leaking samples. Several pairs of leakage samples must be combined which means high computational power. For second-order attacks, the computational complexity is quadratic. At CHES '04, Waddle and Wagner introduced attacks with complexity O(n log 2 n) on traces collected from a hardware cryptographic implementation,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 16 publications
(26 citation statements)
references
References 14 publications
0
26
0
Order By: Relevance
“…A naturally expression (namely the overwriting of a look-up table address by the result) is indeed shown to leak, at first-order (despite the masks that are still there). The efficiency of such an attack is contrasted to second-order attacks [3]. In summary, this paper has shown that a universal verification of the implementation in practice is necessary due diligence, even for provable masking scheme (that are based on hypotheses that must be checked).…”
Section: Discussionmentioning
confidence: 96%
See 3 more Smart Citations
“…A naturally expression (namely the overwriting of a look-up table address by the result) is indeed shown to leak, at first-order (despite the masks that are still there). The efficiency of such an attack is contrasted to second-order attacks [3]. In summary, this paper has shown that a universal verification of the implementation in practice is necessary due diligence, even for provable masking scheme (that are based on hypotheses that must be checked).…”
Section: Discussionmentioning
confidence: 96%
“…The mask values are chosen in such a way that the leakage caused by the masked variable X ⊕ S 1 depends on X only at degree 4. It is explained in [4] that such security can be reached if the masks are distributed as the 16 codewords of the [8,4,4] linear code, extension with one parity bit of the [7,4,3] Hamming code.…”
Section: Rsmmentioning
confidence: 99%
See 2 more Smart Citations
“…Other preprocessing methods can be used before any dimensionality reduction such as reduction filtering using a Fourier or a Hartley transform [3]. However, when the transformation is linear and invertible, the covariance method applies in a strictly equivalent way.…”
Section: Discussionmentioning
confidence: 99%