Entry Cobb:2013:LMS from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Cobb:2013:LMS,
author = "William E. Cobb and Rusty O. Baldwin and Eric D.
Laspe",
title = "Leakage Mapping: a Systematic Methodology for
Assessing the Side-Channel Information Leakage of
Cryptographic Implementations",
journal = j-TISSEC,
volume = "16",
number = "1",
pages = "2:1--2:??",
month = jun,
year = "2013",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2487222.2487224",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Fri Jun 14 19:25:26 MDT 2013",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "We propose a generalized framework to evaluate the
side-channel information leakage of symmetric block
ciphers. The leakage mapping methodology enables the
systematic and efficient identification and mitigation
of problematic information leakages by exhaustively
considering relevant leakage models. The evaluation
procedure bounds the anticipated resistance of an
implementation to the general class of univariate
differential side-channel analysis techniques. Typical
applications are demonstrated using the well-known
Hamming weight and Hamming distance leakage models,
with recommendations for the incorporation of more
accurate models. The evaluation results are empirically
validated against correlation-based differential
side-channel analysis attacks on two typical
unprotected implementations of the Advanced Encryption
Standard.",
acknowledgement = ack-nhfb,
articleno = "2",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- accurate,
10(2)5,
11(4)23,
13(3)27,
13(4)38,
18(3)11
- advanced,
14(1)5,
18(2)5,
18(2)7
- against,
2(3)230,
2(4)354,
2(4)416,
9(4)461,
10(3)11,
11(2)3,
11(3)13,
11(4)22,
12(3)18,
13(3)22,
13(3)28,
14(1)7,
14(1)13,
14(3)24,
15(1)3,
15(2)6,
15(2)8,
15(3)14,
16(1)1,
16(2)8,
16(4)13,
17(1)4,
17(2)7,
17(2)8,
18(1)2,
18(2)7
- analysis,
1(1)66,
2(1)34,
2(2)138,
2(3)230,
2(3)332,
4(1)1,
6(4)443,
7(2)175,
7(4)489,
8(3)312,
9(3)292,
9(4)391,
10(1)2,
10(3)9,
10(3)10,
10(3)11,
10(4)2,
10(4)6,
11(2)3,
11(3)13,
11(3)15,
11(4)17,
11(4)18,
11(4)23,
12(1)4,
12(2)10,
12(3)16,
13(1)10,
13(3)25,
13(3)26,
13(3)27,
13(4)41,
14(1)6,
14(1)8,
14(1)13,
14(2)15,
14(4)28,
15(3)14,
15(4)17,
15(4)18,
16(1)4,
16(2)8,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(1)1,
17(1)4,
17(2)7,
17(3)9,
17(4)14,
18(1)1,
18(1)4,
18(2)6
- application,
1(1)66,
2(2)159,
2(2)177,
2(4)354,
4(2)103,
7(1)1,
7(1)97,
8(3)287,
9(1)1,
9(1)94,
10(1)2,
10(2)6,
10(4)3,
11(1)2,
11(1)3,
11(3)14,
11(3)16,
11(4)22,
12(1)2,
12(1)3,
12(2)11,
12(3)14,
12(4)21,
13(1)4,
13(1)10,
13(2)17,
13(3)22,
13(3)26,
13(4)38,
13(4)39,
14(1)2,
14(1)3,
14(1)6,
14(1)8,
14(1)9,
14(2)19,
14(3)27,
15(1)2,
15(1)4,
16(1)1,
16(2)6,
16(3)9,
16(4)13,
16(4)17,
17(2)5,
17(4)13,
18(3)10,
18(4)12
- assessing,
8(1)119
- block,
10(1)4,
13(4)33,
13(4)39,
14(1)5,
14(1)12,
15(1)2,
15(2)6,
17(4)15
- bound,
9(4)391,
10(4)6,
11(2)3,
11(4)19,
12(3)16,
13(3)27,
14(1)14,
15(3)13,
16(1)4,
17(3)11,
18(1)4
- channel, side-,
17(2)8,
18(1)4
- cipher,
4(2)134,
7(2)319,
13(4)33,
16(3)10,
18(1)4
- class,
2(2)177,
9(4)391,
10(1)2,
10(1)3,
10(4)5,
11(2)1,
11(4)19,
12(1)2,
12(3)18,
12(4)20,
13(3)21,
14(1)13,
16(4)17,
18(2)5,
18(4)13
- considering,
14(4)28,
15(1)5,
17(1)1
- cryptographic,
2(3)230,
2(4)354,
2(4)390,
2(4)416,
9(2)181,
10(2)6,
10(3)10,
10(4)3,
11(3)12,
12(2)9,
13(1)2,
14(1)10,
14(1)11,
14(1)14,
15(1)3,
15(2)9,
16(2)6,
17(2)7,
17(3)10,
18(1)3
- demonstrated,
12(3)17,
14(3)27
- efficient,
1(1)26,
3(2)63,
6(2)258,
6(3)365,
7(1)21,
9(4)391,
9(4)461,
10(1)3,
10(2)5,
10(2)6,
10(4)2,
11(1)3,
11(2)4,
11(2)6,
11(3)15,
11(4)19,
12(1)1,
12(3)15,
12(3)18,
12(4)21,
13(1)9,
13(1)10,
13(3)24,
13(3)27,
13(4)31,
13(4)32,
13(4)34,
13(4)38,
14(1)5,
14(1)14,
15(1)4,
15(2)6,
15(2)9,
15(4)16,
16(1)4,
17(3)10,
17(4)15,
18(3)11
- empirically,
14(3)27,
15(3)12,
15(4)18,
18(1)2
- enable,
2(2)177,
2(3)230,
2(4)354,
9(4)461,
10(2)5,
11(1)3,
11(4)17,
11(4)23,
12(1)1,
12(1)6,
12(3)14,
13(3)25,
13(4)31,
14(1)3,
14(1)8,
14(4)32,
15(2)7,
16(2)7,
17(2)5,
17(2)8,
17(3)10,
17(4)16,
18(1)2
- encryption,
2(3)230,
2(4)416,
6(3)365,
7(1)1,
7(2)206,
9(2)162,
9(3)325,
9(4)461,
10(2)6,
10(4)4,
11(2)4,
13(3)22,
13(4)31,
13(4)33,
13(4)35,
13(4)41,
16(3)10,
17(2)6,
18(1)4,
18(3)10
- evaluate,
2(2)138,
2(4)354,
10(4)3,
11(2)3,
11(3)12,
11(3)14,
13(3)26,
13(4)30,
13(4)35,
14(1)3,
15(3)13,
15(4)17,
16(2)6,
17(1)1,
17(2)8,
17(4)14,
18(4)14
- evaluation,
2(3)295,
3(4)262,
10(1)3,
11(1)3,
11(4)20,
11(4)22,
12(2)8,
12(2)11,
12(4)20,
13(2)14,
13(3)24,
13(3)25,
16(1)1,
16(3)9,
16(4)13,
16(4)17,
17(4)14,
18(1)1
- framework,
2(3)295,
3(4)227,
6(1)71,
6(3)404,
7(2)175,
8(2)187,
9(2)181,
9(4)391,
10(1)2,
10(3)10,
11(1)3,
11(3)12,
11(4)19,
11(4)20,
12(1)2,
12(1)4,
12(1)5,
12(3)19,
12(4)21,
13(3)24,
13(3)28,
14(1)9,
14(1)11,
14(2)21,
14(4)31,
15(2)10,
15(3)12,
15(3)14,
15(4)17,
16(3)9,
16(4)15,
16(4)17,
17(1)3,
17(2)5,
17(2)7,
17(3)11,
17(3)12,
17(4)13,
17(4)14,
17(4)15,
18(1)4,
18(3)10,
18(4)12
- general,
1(1)66,
2(1)65,
2(1)105,
2(2)159,
2(3)230,
2(3)269,
9(2)181,
9(4)391,
10(1)2,
10(4)1,
11(1)3,
12(1)2,
12(1)5,
12(3)18,
12(4)20,
13(3)28,
15(1)2,
15(3)13,
16(1)4,
16(2)7,
17(1)3,
17(1)4,
18(1)3,
18(3)10,
18(4)12
- generalized,
10(4)2,
13(4)39,
18(2)8
- Hamming,
2(4)416
- identification,
11(3)15,
12(4)21,
15(2)7,
15(4)16,
17(3)12
- implementation,
1(1)3,
1(1)26,
1(1)66,
2(1)34,
2(2)177,
2(4)390,
2(4)416,
7(2)319,
11(1)2,
11(1)3,
11(1)4,
11(3)16,
11(4)18,
11(4)22,
12(1)1,
12(2)10,
12(2)11,
12(3)14,
12(4)22,
13(1)4,
13(3)26,
13(3)27,
14(1)3,
15(1)3,
15(2)8,
15(3)13,
15(4)16,
16(1)1,
16(3)9,
16(3)10,
16(3)11,
16(4)13,
17(2)5,
17(2)8,
18(1)2,
18(1)3,
18(1)4
- known, well-,
2(1)65,
2(2)138,
12(1)5,
13(3)24,
15(3)13,
18(4)12
- leakage,
5(3)262,
12(2)9,
12(3)17
- mapping,
13(3)20
- methodology,
5(4)458,
10(2)7,
15(3)12,
16(4)17,
17(1)1,
17(4)16
- mitigation,
13(4)35,
17(2)8,
17(3)9
- more,
2(1)3,
2(1)65,
2(3)332,
9(2)181,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(3)9,
10(4)1,
10(4)4,
10(4)6,
11(2)3,
11(2)4,
11(2)6,
11(3)14,
11(4)21,
12(1)1,
12(2)8,
12(2)10,
12(2)12,
12(2)13,
12(3)18,
13(1)10,
13(3)20,
13(3)21,
13(3)22,
13(3)28,
13(4)32,
13(4)34,
13(4)39,
14(3)27,
14(4)31,
15(1)2,
15(1)5,
15(2)8,
15(2)9,
15(3)11,
15(3)12,
15(4)16,
16(2)8,
16(3)10,
16(3)11,
16(4)17,
17(1)2,
17(1)3,
17(3)9,
17(4)14,
17(4)16,
18(1)1,
18(3)11,
18(4)13
- problematic,
10(4)6
- procedure,
9(4)421,
11(4)18,
17(1)1,
17(2)5,
17(2)6
- propose,
1(1)26,
2(1)65,
2(2)138,
2(3)269,
9(2)162,
9(4)391,
9(4)421,
10(1)3,
10(1)4,
10(3)12,
10(4)1,
10(4)3,
10(4)4,
10(4)6,
11(1)3,
11(1)4,
11(3)12,
11(3)15,
11(4)18,
11(4)19,
11(4)23,
12(1)4,
12(2)8,
12(2)11,
12(2)13,
12(3)18,
13(3)28,
13(4)32,
13(4)36,
13(4)40,
13(4)41,
14(1)5,
14(1)10,
14(1)11,
14(3)24,
14(3)26,
14(4)30,
15(2)7,
15(4)17,
16(4)15,
16(4)16,
17(1)1,
17(3)10,
17(3)11,
17(3)12,
17(4)13,
17(4)14,
18(1)2,
18(2)7
- recommendations,
7(2)319,
18(4)13
- relevant,
10(4)4,
12(1)2,
13(3)24,
15(4)18,
17(2)7
- resistance,
2(3)230,
10(3)9
- result,
1(1)3,
1(1)26,
2(3)230,
2(4)390,
9(2)162,
10(1)3,
10(1)4,
10(2)5,
10(2)6,
10(3)9,
10(3)11,
10(4)2,
10(4)5,
11(2)3,
11(2)5,
11(3)13,
11(3)15,
11(4)18,
11(4)20,
11(4)21,
11(4)22,
12(1)4,
12(2)9,
12(3)14,
12(3)17,
13(1)10,
13(3)22,
13(3)24,
13(3)25,
13(4)33,
13(4)35,
14(1)2,
14(1)14,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(3)13,
15(3)14,
15(4)15,
16(1)3,
16(2)5,
16(2)6,
16(2)7,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(2)7,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
18(1)4,
18(2)5,
18(2)6,
18(3)9,
18(3)11,
18(4)12,
18(4)13
- side-channel,
17(2)8,
18(1)4
- standard,
2(3)230,
2(4)416,
4(3)224,
7(2)319,
10(2)8,
10(3)11,
10(3)12,
11(1)4,
11(2)4,
12(1)1,
12(3)18,
13(3)28,
13(4)35,
13(4)37,
13(4)41,
15(1)2,
16(1)3,
16(3)10,
16(4)15,
17(3)11,
17(4)16,
18(4)14
- symmetric,
15(2)9,
17(2)5
- technique,
1(1)3,
2(2)138,
2(3)230,
2(3)295,
2(4)416,
7(2)274,
9(4)391,
9(4)461,
10(2)6,
10(3)9,
10(4)6,
11(2)2,
11(3)12,
11(3)16,
11(4)17,
11(4)18,
11(4)22,
12(1)4,
12(2)11,
12(2)13,
12(3)16,
12(3)18,
13(3)22,
13(3)25,
13(3)28,
13(4)32,
13(4)33,
13(4)35,
13(4)36,
13(4)39,
14(1)3,
14(1)5,
14(1)6,
14(1)13,
14(3)24,
14(4)32,
15(1)2,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(4)17,
15(4)18,
16(2)6,
16(2)7,
16(3)11,
16(4)13,
16(4)14,
17(3)9,
17(3)12,
17(4)16,
18(1)2,
18(2)6,
18(3)11
- two,
1(1)26,
2(4)416,
9(4)391,
10(1)4,
10(2)6,
10(2)8,
10(3)10,
10(4)4,
11(2)1,
11(2)4,
11(2)6,
11(3)13,
11(4)22,
12(1)2,
12(1)3,
12(1)4,
12(1)6,
12(3)14,
12(4)20,
13(3)22,
13(3)27,
13(4)40,
14(1)4,
14(1)5,
14(4)30,
15(1)2,
15(1)5,
15(2)6,
15(3)11,
15(3)12,
16(1)1,
16(1)4,
16(3)9,
16(3)10,
16(4)15,
17(4)13,
18(2)5,
18(4)12,
18(4)13,
18(4)14
- typical,
10(2)8,
11(4)20,
15(1)3,
16(2)8
- unprotected,
15(2)9
- using,
2(2)138,
2(2)177,
2(3)332,
4(3)289,
6(2)258,
6(3)327,
9(2)113,
9(2)162,
9(2)181,
9(3)292,
9(3)325,
9(4)461,
10(1)4,
10(2)8,
10(3)11,
10(4)3,
10(4)6,
11(1)2,
11(2)1,
11(2)2,
11(2)3,
11(3)14,
11(4)19,
11(4)21,
12(2)10,
12(2)11,
13(1)2,
13(1)8,
13(3)20,
13(3)26,
13(4)31,
13(4)35,
13(4)39,
14(1)3,
14(1)12,
14(1)14,
14(3)27,
15(1)2,
15(3)11,
15(3)12,
15(4)15,
15(4)17,
16(1)1,
16(1)4,
16(2)5,
16(2)6,
16(3)10,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)13,
17(4)14,
17(4)16,
18(2)7,
18(2)8,
18(3)10,
18(3)11,
18(4)14
- validated,
12(2)8,
18(3)11
- weight,
2(4)416
- well-known,
2(1)65,
2(2)138,
12(1)5,
13(3)24,
15(3)13,
18(4)12