Size: 1590
Comment:
|
Size: 1635
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 5: | Line 5: |
[[attachment:[MDS99] 1999 - USENIX - Investigations of Power Analysis Attacks on Smartcards.pdf|[MDS99] 1999 - USENIX - Investigations of Power Analysis Attacks on Smartcards]] | [[attachment:[MDS99] 1999 - USENIX - Investigations of Power Analysis Attacks on Smartcards.pdf|[MDS99] 1999 - USENIX - Investigations of Power Analysis Attacks on Smartcards||&do=get]] |
Line 7: | Line 7: |
[[attachment:[CRR02] 2002 - CHES - Template Attacks.pdf|[CRR02] 2002 - CHES - Template Attacks]] | [[attachment:[CRR02] 2002 - CHES - Template Attacks.pdf|[CRR02] 2002 - CHES - Template Attacks||&do=get]] |
Line 9: | Line 9: |
[[attachment:[BCO04] 2004 - CHES - Correlation Power Analysis with a Leakage Model.pdf|[BCO04] 2004 - CHES - Correlation Power Analysis with a Leakage Model]] | [[attachment:[BCO04] 2004 - CHES - Correlation Power Analysis with a Leakage Model.pdf|[BCO04] 2004 - CHES - Correlation Power Analysis with a Leakage Model||&do=get]] |
Line 11: | Line 11: |
[[attachment:[SLP05] 2005 - CHES - A Stochastic Model for Differential Side Channel Cryptanalysis.pdf|[SLP05] 2005 - CHES - A Stochastic Model for Differential Side Channel Cryptanalysis]] | [[attachment:[SLP05] 2005 - CHES - A Stochastic Model for Differential Side Channel Cryptanalysis.pdf|[SLP05] 2005 - CHES - A Stochastic Model for Differential Side Channel Cryptanalysis||&do=get]] |
Line 13: | Line 13: |
[[attachment:[PSQ07] 2007 - VLSI J. - Power and Electromagnetic Analysis Improved Model, Consequences and Comparisons.pdf|[PSQ07] 2007 - VLSI J. - Power and Electromagnetic Analysis Improved Model, Consequences and Comparisons]] | [[attachment:[PSQ07] 2007 - VLSI J. - Power and Electromagnetic Analysis Improved Model, Consequences and Comparisons.pdf|[PSQ07] 2007 - VLSI J. - Power and Electromagnetic Analysis Improved Model, Consequences and Comparisons||&do=get]] |
Voici quelques articles abordant la modélisation de la fuite physique (souvent dans le but d'introduire une nouvelle technique d'attaque).
[MDS99] observe le modèle du poids de Hamming avec bruit Gaussien. [CRR02] introduit le modèle du bruit Gaussien multi varié (avec fonction de fuite quelconque). [BCO04] introduit le modèle de la distance de Hamming. [SLP05] généralise le modèle du poids (distance) de Hamming au cas où les bits ont différents poids. [PSQ07] étend le modèle de la distance de Hamming en différenciant les transitions 0->1 et 1->0. Ces articles ont une approche assez expérimentale: la fuite est modélisée de façon intuitive et le modèle est ensuite vérifié expérimentalement.
[[attachment:[MDS99] 1999 - USENIX - Investigations of Power Analysis Attacks on Smartcards.pdf|[MDS99] 1999 - USENIX - Investigations of Power Analysis Attacks on Smartcards||&do=get]]
[[attachment:[CRR02] 2002 - CHES - Template Attacks.pdf|[CRR02] 2002 - CHES - Template Attacks||&do=get]]
[[attachment:[BCO04] 2004 - CHES - Correlation Power Analysis with a Leakage Model.pdf|[BCO04] 2004 - CHES - Correlation Power Analysis with a Leakage Model||&do=get]]
[[attachment:[SLP05] 2005 - CHES - A Stochastic Model for Differential Side Channel Cryptanalysis.pdf|[SLP05] 2005 - CHES - A Stochastic Model for Differential Side Channel Cryptanalysis||&do=get]]
[[attachment:[PSQ07] 2007 - VLSI J. - Power and Electromagnetic Analysis Improved Model, Consequences and Comparisons.pdf|[PSQ07] 2007 - VLSI J. - Power and Electromagnetic Analysis Improved Model, Consequences and Comparisons||&do=get]]