Research Article

Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

Figure 4

(a) Mask recovery success rate for 10,000 traces. (b) Global success rate (GSR) versus number of traces for different noise levels. The mask recovery attack outperforms the second-order attack by at least two orders of magnitude at every SNR.
(a)
(b)