Towards Efficient Second-Order Power Analysis

نویسندگان

  • Jason Waddle
  • David A. Wagner
چکیده

Viable cryptosystem designs must address power analysis attacks, and masking is a commonly proposed technique for defending against these side-channel attacks. It is possible to overcome simple masking by using higher-order techniques, but apparently only at some cost in terms of generality, number of required samples from the device being attacked, and computational complexity. We make progress towards ascertaining the significance of these costs by exploring a couple of attacks that attempt to efficiently employ second-order techniques to overcome masking. In particular, we consider two variants of secondorder differential power analysis: Zero-Offset 2DPA and FFT 2DPA.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mathematical Analysis of Optimal Tracking Interval Management for Power Efficient Target Tracking Wireless Sensor Networks

In this paper, we study the problem of power efficient tracking interval management for distributed target tracking wireless sensor networks (WSNs). We first analyze the performance of a distributed target tracking network with one moving object, using a quantitative mathematical analysis. We show that previously proposed algorithms are efficient only for constant average velocity objects howev...

متن کامل

Hierarchical Analysis Method Application in Prioritization of Power Plant with Renewable Energy in Iran-case study

With regard to the importance of scientific decision-making in power plants prioritization to produce electrical energy (power) from renewable energies (purified), in this paper, research with specialists opinions with respond to questionnaires provided upon three efficient operational criterion in position of three presented power plant in country which used wind, solar water energies for prod...

متن کامل

Practical Second - Order Correlation Power Analysis on the Message Blinding Method and Its Novel Countermeasure for RSA

© 2010 ETRI Journal, Volume 32, Number 1, February 2010 Recently power attacks on RSA cryptosystems have been widely investigated, and various countermeasures have been proposed. One of the most efficient and secure countermeasures is the message blinding method, which includes the RSA derivative of the binary-with-randominitial-point algorithm on elliptical curve cryptosystems. It is known to ...

متن کامل

Second order sensitivity analysis for shape optimization of continuum structures

This study focuses on the optimization of the plane structure. Sequential quadratic programming (SQP) will be utilized, which is one of the most efficient methods for solving nonlinearly constrained optimization problems. A new formulation for the second order sensitivity analysis of the two-dimensional finite element will be developed. All the second order required derivatives will be calculat...

متن کامل

Introduce an Optimal Pricing Strategy Using the Parameter of "Contingency Analysis" Neplan Software in the Power MarketCase Study (Azerbaijan Electricity Network)

Overall price optimization strategy in the deregulated electricity market is one of the most important challenges for the participants, In this paper, we used Contingency Analysis Module of NEPLAN Software, a strategy of pricing to market participants is depicted.Each of power plants according to their size and share of the Contingency Analysis should be considered in the price of its hour. In ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004