WebSite Logo
  • Content
  • Similar Resources
  • Metadata
  • Cite This
  • Language
    অসমীয়া বাংলা भोजपुरी डोगरी English ગુજરાતી हिंदी ಕನ್ನಡ
    Khasi कोंकणी मैथिली മലയാളം ꯃꯤꯇꯩ ꯂꯣꯟ मराठी Mizo नेपाली
    ଓଡ଼ିଆ ਪੰਜਾਬੀ संस्कृत ᱥᱟᱱᱛᱟᱲᱤ सिन्धी தமிழ் తెలుగు اردو
  • Log-in
  • Fullscreen
Log-in
Do not have an account? Register Now
Forgot your password? Account recovery
  1. Science in China Series : Information Sciences
  2. Science in China Series : Information Sciences : Volume 55
  3. Science in China Series : Information Sciences : Volume 55, Issue 7, July 2012
  4. Polar differential power attacks and evaluation
Loading...

Please wait, while we are loading the content...

Science in China Series : Information Sciences : Volume 61
Science in China Series : Information Sciences : Volume 60
Science in China Series : Information Sciences : Volume 59
Science in China Series : Information Sciences : Volume 58
Science in China Series : Information Sciences : Volume 57
Science in China Series : Information Sciences : Volume 56
Science in China Series : Information Sciences : Volume 55
Science in China Series : Information Sciences : Volume 55, Issue 12, December 2012
Science in China Series : Information Sciences : Volume 55, Issue 11, November 2012
Science in China Series : Information Sciences : Volume 55, Issue 10, October 2012
Science in China Series : Information Sciences : Volume 55, Issue 9, September 2012
Science in China Series : Information Sciences : Volume 55, Issue 8, August 2012
Science in China Series : Information Sciences : Volume 55, Issue 7, July 2012
P2P traffic optimization
SCautz: a high performance and fault-tolerant datacenter network for modular datacenters
Radiance-based color calibration for image-based modeling with multiple cameras
Perceptual video hashing robust against geometric distortions
Human knowledge acquisition from 3D interaction in virtual environments
Relay-assisted hierarchical adaptation scheme for multi-user scalable video delivery to heterogeneous mobile devices
Further results on the margin explanation of boosting: new algorithm and experiments
Contourlet HMT model with directional feature
The upper bound of the minimal number of hidden neurons for the parity problem in binary neural networks
Polar differential power attacks and evaluation
A wireless secret key generation method based on Chinese remainder theorem in FDD systems
On the construction of multi-output Boolean functions with optimal algebraic immunity
On semi-bent functions with Niho exponents
Accountable authority key policy attribute-based encryption
Efficient construction of provably secure steganography under ordinary covert channels
Symbolic algorithmic verification of intransitive generalized noninterference
CMQV+: An authenticated key exchange protocol from CMQV
A framework for multi-robot motion planning from temporal logic specifications
Synchronization of multiple autonomous underwater vehicles without velocity measurements
An adaptive control with optimal disturbances rejection
A logistic regression model for Semantic Web service matchmaking
Science in China Series : Information Sciences : Volume 55, Issue 6, June 2012
Science in China Series : Information Sciences : Volume 55, Issue 5, May 2012
Science in China Series : Information Sciences : Volume 55, Issue 4, April 2012
Science in China Series : Information Sciences : Volume 55, Issue 3, March 2012
Science in China Series : Information Sciences : Volume 55, Issue 2, February 2012
Science in China Series : Information Sciences : Volume 55, Issue 1, January 2012
Science in China Series : Information Sciences : Volume 54
Science in China Series : Information Sciences : Volume 53
Science in China Series : Information Sciences : Volume 52
Science in China Series : Information Sciences : Volume 51
Science in China Series : Information Sciences : Volume 50
Science in China Series : Information Sciences : Volume 49
Science in China Series : Information Sciences : Volume 48
Science in China Series : Information Sciences : Volume 47
Science in China Series : Information Sciences : Volume 46
Science in China Series : Information Sciences : Volume 45
Science in China Series : Information Sciences : Volume 44

Similar Documents

...
Scan attacks on side-channel and fault attack resistant public-key implementations

Article

...
Side Channel Attacks

Chapter

...
Information Leakage Discovery Techniques to Enhance Secure Chip Design

Conference Proceedings

...
Univariate side channel attacks and leakage modeling

Article

...
Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture

Article

...
Get your hands off my laptop: physical side-channel key-extraction attacks on PCs : Extended version

Article

...
Message-aimed side channel and fault attacks against public key cryptosystems with homomorphic properties

Article

...
Introduction to differential power analysis

Article

...
A machine learning approach against a masked AES : Reaching the limit of side-channel attacks with a learning model

Article

Polar differential power attacks and evaluation

Content Provider Springer Nature Link
Author Tang, Ming Qiu, ZhenLong Gao, Si Yi, Mu Liu, ShuBo Zhang, HuanGuo Jin, YingZhen
Copyright Year 2012
Abstract Side channel attacks (SCAs) on security software and hardware have become major concerns on computer and system security. The existing SCAs generally require the knowledge of the corresponding cryptographic algorithm and implementation adopted in the target; therefore, they are not fully suitable for practical applications. In this paper, we propose a novel SCA—polar differential power attack (polar DPA). We found that DPA peaks have different biases for different cryptographic algorithms and implementations. Based on these biases, we can successfully attack a block cipher, assuming that the cipher algorithm uses a secret key in its first round, without the knowledge of the cipher algorithm or implementation. Other rounds can be treated as a black box. We present a detailed theoretical analysis and experiment to demonstrate the correctness and efficiency of our scheme. Furthermore, our scheme has demonstrated an improvement over the leakage evaluation scheme due to Ichikawa et al. (CHES 2005). Our evaluation method can be used in electronic design automatic (EDA) flows and can help security circuit designers to understand the data leakage due to SCAs.
Starting Page 1588
Ending Page 1604
Page Count 17
File Format PDF
ISSN 1674733X
Journal Science in China Series : Information Sciences
Volume Number 55
Issue Number 7
e-ISSN 18691919
Language English
Publisher SP Science China Press
Publisher Date 2012-04-20
Publisher Place Heidelberg
Access Restriction One Nation One Subscription (ONOS)
Subject Keyword computer security differential power attack side channel attack Information Systems and Communication Service
Content Type Text
Resource Type Article
Subject Computer Science
  • About
  • Disclaimer
  • Feedback
  • Sponsor
  • Contact
About National Digital Library of India (NDLI)
NDLI logo

National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.

Learn more about this project from here.

Disclaimer

NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.

Feedback

Sponsor

Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.

Contact National Digital Library of India
Central Library (ISO-9001:2015 Certified)
Indian Institute of Technology Kharagpur
Kharagpur, West Bengal, India | PIN - 721302
See location in the Map
03222 282435
Mail: support@ndl.gov.in
Sl. Authority Responsibilities Communication Details
1 Ministry of Education (GoI),
Department of Higher Education
Sanctioning Authority https://www.education.gov.in/ict-initiatives
2 Indian Institute of Technology Kharagpur Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project https://www.iitkgp.ac.in
3 National Digital Library of India Office, Indian Institute of Technology Kharagpur The administrative and infrastructural headquarters of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
4 Project PI / Joint PI Principal Investigator and Joint Principal Investigators of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
Prof. Saswat Chakrabarti  will be added soon
5 Website/Portal (Helpdesk) Queries regarding NDLI and its services support@ndl.gov.in
6 Contents and Copyright Issues Queries related to content curation and copyright issues content@ndl.gov.in
7 National Digital Library of India Club (NDLI Club) Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach clubsupport@ndl.gov.in
8 Digital Preservation Centre (DPC) Assistance with digitizing and archiving copyright-free printed books dpc@ndl.gov.in
9 IDR Setup or Support Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops idr@ndl.gov.in
Cite this Content
Loading...