Research Article

Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

Figure 2

NICV for each plaintext byte over traces. (a) AES operations are identifiable. (b) NICV for the first 3 bytes of plaintext. Each byte exhibits similar characteristics, which implies the operation taking place a number times, but each time processing different data.
(a)
(b)