Entry Cobb:2013:LMS from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Cobb:2013:LMS,
  author =       "William E. Cobb and Rusty O. Baldwin and Eric D.
                 Laspe",
  title =        "Leakage Mapping: a Systematic Methodology for
                 Assessing the Side-Channel Information Leakage of
                 Cryptographic Implementations",
  journal =      j-TISSEC,
  volume =       "16",
  number =       "1",
  pages =        "2:1--2:??",
  month =        jun,
  year =         "2013",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2487222.2487224",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Fri Jun 14 19:25:26 MDT 2013",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "We propose a generalized framework to evaluate the
                 side-channel information leakage of symmetric block
                 ciphers. The leakage mapping methodology enables the
                 systematic and efficient identification and mitigation
                 of problematic information leakages by exhaustively
                 considering relevant leakage models. The evaluation
                 procedure bounds the anticipated resistance of an
                 implementation to the general class of univariate
                 differential side-channel analysis techniques. Typical
                 applications are demonstrated using the well-known
                 Hamming weight and Hamming distance leakage models,
                 with recommendations for the incorporation of more
                 accurate models. The evaluation results are empirically
                 validated against correlation-based differential
                 side-channel analysis attacks on two typical
                 unprotected implementations of the Advanced Encryption
                 Standard.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

Related entries