Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 5098626, 8 pages
https://doi.org/10.1155/2017/5098626
Research Article

RFA: -Squared Fitting Analysis Model for Power Attack

1The School of Computer Science, Beijing Institute of Technology, Beijing 100081, China
2State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878, China
3The College of Bioengineering, Beijing Polytechnic, Beijing 100176, China
4The Science and Technology on Information Assurance Laboratory, Beijing 100072, China

Correspondence should be addressed to Liehuang Zhu; nc.ude.tib@zgnauheil

Received 4 January 2017; Accepted 27 February 2017; Published 18 April 2017

Academic Editor: Xiaojiang Du

Copyright © 2017 An Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. X. Hei and X. Du, “Biometric-based two-level secure access control for implantable medical devices during emergencies,” in Proceedings of the 30th IEEE International Conference on Computer Communications (IEEE INFOCOM '11), pp. 346–350, Shanghai, China, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  2. X. Hei, X. Du, J. Wu, and F. Hu, “Defending resource depletion attacks on implantable medical devices,” in Proceedings of the 53rd IEEE Global Communications Conference (GLOBECOM '10), Seattle, Wash, USA, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. X. Du, M. Guizani, Y. Xiao et al., “Defending DoS attacks on broadcast authentication in wireless sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '08), pp. 1653–1657, IEEE, 2008.
  4. S. Mangard, N. Pramstaller, and E. Oswald, “Successfully attacking masked AES hardware implementations,” in Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, pp. 157–171, Springer, Edinburgh, UK, 2005.
  5. P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis,” in Proceedings of the 19th Annual International Cryptology Conference, pp. 388–397, Springer, Santa Barbara, Calif, USA, 1999.
  6. S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer Science Business Media, Berlin, Germany, 2008.
  7. M. L. Akkar, R. Bevan, P. Dischamp et al., “Power analysis, what is now possible,” in Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, pp. 489–502, Springer, 2000.
  8. C. Herbst, E. Oswald, and S. Mangard, “An AES smart card implementation resistant to power analysis attacks,” in Proceedings of the International Conference on Applied Cryptography and Network Security, pp. 239–252, Springer, 2006.
  9. D. Agrawal, B. Archambeault, J. R. Rao et al., “The EM side-channel(s),” in Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, pp. 29–45, Springer, Redwood Shores, Calif, USA, August 2002.
  10. K. Gandolfi, C. Mourtel, and F. Olivier, “Electromagnetic analysis: concrete results,” in Proceedings of the 3rd International Workshop on Cryptographic Hardware and Embedded Systems, pp. 251–261, Paris, France, 2001.
  11. J. Quisquater and D. Samyde, “ElectroMagnetic analysis: measures and counter-measures for smart cards,” in Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security, pp. 200–210, Springer, Cannes, France, September 2001.
  12. E. Brier, C. Clavier, and F. Olivier, “Correlation power analysis with a leakage model,” in Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, pp. 16–29, Springer, Cambridge, Mass, USA, August 2004.
  13. B. Gierlichs, L. Batina, P. Tuyls et al., “Mutual information analysis,” in Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, pp. 426–442, Springer, Washington, DC, USA, August 2008.
  14. L. Batina, B. Gierlichs, and K. Lemke-Rust, “Differential cluster analysis,” in Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems (CHES '09), pp. 112–127, Springer, Lausanne, Switzerland, September 2009.
  15. G. Dabosville, J. Doget, and E. Prouff, “A new second-order side channel attack based on linear regression,” IEEE Transactions on Computers, vol. 62, no. 8, pp. 1629–1640, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  16. J. W. Bos, C. Hubain, W. Michiels et al., “Differential computation analysis: hiding your white-box designs is not enough,” in Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems, pp. 215–236, Springer, Santa Barbara, Calif, USA, August 2016.
  17. T. H. Le, J. Clédière, C. Canovas, B. Robisson, C. Servière, and J.-C. Lacoume, “A proposition for correlation power analysis enhancement,” in Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, pp. 174–186, Springer, Yokohama, Japan, October 2006.
  18. T. S. Messerges, A. E. Dabbish, and R. H. Sloan, “Investigations of power analysis attacks on smartcards,” Smartcard, vol. 99, pp. 151–161, 1999. View at Google Scholar
  19. D. E. Knuth, The Art of Computer Programming, Volume 2: Seminumerical Algorithms, Pearson Education, Upper Saddle River, NJ, USA, 1997. View at MathSciNet
  20. E. Oswald, S. Mangard, C. Herbst, and S. Tillich, “Practical second-order DPA attacks for masked smart card implementations of block ciphers,” in Proceedings of the Cryptographers' Track at the RSA Conference on Topics in Cryptology, pp. 192–207, Springer, San Jose, Calif, USA, February 2006.
  21. C. Clavier, B. Feix, G. Gagnerot et al., “Improved collision-correlation power analysis on first order protected AES,” in Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, pp. 49–62, Springer, 2011.