Research Article

RFA: -Squared Fitting Analysis Model for Power Attack

Algorithm 3

RFA on second-order CPA attacks.
Input: random plaintexts,
   template.
Output: .
(1) Encryptand acquire,
   
(2) 
(3) for do
(4) for do
(5)  
(6)  
(7) end for
(8) Compute thebetween
    and
(9) end for
(10) return