Locked History Actions

Diff for "Biblio - Modélisation de la fuite physique"

Differences between revisions 2 and 3
Revision 2 as of 2009-05-11 08:02:29
Size: 1590
Editor: cha92-10-82-240-229-233
Comment:
Revision 3 as of 2009-05-11 08:29:04
Size: 1635
Editor: cha92-10-82-240-229-233
Comment:
Deletions are marked like this. Additions are marked like this.
Line 5: Line 5:
[[attachment:[MDS99] 1999 - USENIX - Investigations of Power Analysis Attacks on Smartcards.pdf|[MDS99] 1999 - USENIX - Investigations of Power Analysis Attacks on Smartcards]] [[attachment:[MDS99] 1999 - USENIX - Investigations of Power Analysis Attacks on Smartcards.pdf|[MDS99] 1999 - USENIX - Investigations of Power Analysis Attacks on Smartcards||&do=get]]
Line 7: Line 7:
[[attachment:[CRR02] 2002 - CHES - Template Attacks.pdf|[CRR02] 2002 - CHES - Template Attacks]] [[attachment:[CRR02] 2002 - CHES - Template Attacks.pdf|[CRR02] 2002 - CHES - Template Attacks||&do=get]]
Line 9: Line 9:
[[attachment:[BCO04] 2004 - CHES - Correlation Power Analysis with a Leakage Model.pdf|[BCO04] 2004 - CHES - Correlation Power Analysis with a Leakage Model]] [[attachment:[BCO04] 2004 - CHES - Correlation Power Analysis with a Leakage Model.pdf|[BCO04] 2004 - CHES - Correlation Power Analysis with a Leakage Model||&do=get]]
Line 11: Line 11:
[[attachment:[SLP05] 2005 - CHES - A Stochastic Model for Differential Side Channel Cryptanalysis.pdf|[SLP05] 2005 - CHES - A Stochastic Model for Differential Side Channel Cryptanalysis]] [[attachment:[SLP05] 2005 - CHES - A Stochastic Model for Differential Side Channel Cryptanalysis.pdf|[SLP05] 2005 - CHES - A Stochastic Model for Differential Side Channel Cryptanalysis||&do=get]]
Line 13: Line 13:
[[attachment:[PSQ07] 2007 - VLSI J. - Power and Electromagnetic Analysis Improved Model, Consequences and Comparisons.pdf|[PSQ07] 2007 - VLSI J. - Power and Electromagnetic Analysis Improved Model, Consequences and Comparisons]] [[attachment:[PSQ07] 2007 - VLSI J. - Power and Electromagnetic Analysis Improved Model, Consequences and Comparisons.pdf|[PSQ07] 2007 - VLSI J. - Power and Electromagnetic Analysis Improved Model, Consequences and Comparisons||&do=get]]

Voici quelques articles abordant la modélisation de la fuite physique (souvent dans le but d'introduire une nouvelle technique d'attaque).

[MDS99] observe le modèle du poids de Hamming avec bruit Gaussien. [CRR02] introduit le modèle du bruit Gaussien multi varié (avec fonction de fuite quelconque). [BCO04] introduit le modèle de la distance de Hamming. [SLP05] généralise le modèle du poids (distance) de Hamming au cas où les bits ont différents poids. [PSQ07] étend le modèle de la distance de Hamming en différenciant les transitions 0->1 et 1->0. Ces articles ont une approche assez expérimentale: la fuite est modélisée de façon intuitive et le modèle est ensuite vérifié expérimentalement.

[[attachment:[MDS99] 1999 - USENIX - Investigations of Power Analysis Attacks on Smartcards.pdf|[MDS99] 1999 - USENIX - Investigations of Power Analysis Attacks on Smartcards||&do=get]]

[[attachment:[CRR02] 2002 - CHES - Template Attacks.pdf|[CRR02] 2002 - CHES - Template Attacks||&do=get]]

[[attachment:[BCO04] 2004 - CHES - Correlation Power Analysis with a Leakage Model.pdf|[BCO04] 2004 - CHES - Correlation Power Analysis with a Leakage Model||&do=get]]

[[attachment:[SLP05] 2005 - CHES - A Stochastic Model for Differential Side Channel Cryptanalysis.pdf|[SLP05] 2005 - CHES - A Stochastic Model for Differential Side Channel Cryptanalysis||&do=get]]

[[attachment:[PSQ07] 2007 - VLSI J. - Power and Electromagnetic Analysis Improved Model, Consequences and Comparisons.pdf|[PSQ07] 2007 - VLSI J. - Power and Electromagnetic Analysis Improved Model, Consequences and Comparisons||&do=get]]