Locked History Actions

Diff for "Biblio - Modélisation de la fuite physique"

Differences between revisions 2 and 7 (spanning 5 versions)
Revision 2 as of 2009-05-11 08:02:29
Size: 1590
Editor: cha92-10-82-240-229-233
Comment:
Revision 7 as of 2010-03-07 10:19:50
Size: 1683
Editor: bny92-5-82-232-56-37
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
#acl UserGoup:read,write,revert,delete All:read

Line 5: Line 8:
[[attachment:[MDS99] 1999 - USENIX - Investigations of Power Analysis Attacks on Smartcards.pdf|[MDS99] 1999 - USENIX - Investigations of Power Analysis Attacks on Smartcards]] [[attachment:[MDS99] 1999 - USENIX - Investigations of Power Analysis Attacks on Smartcards.pdf|[MDS99] 1999 - USENIX - Investigations of Power Analysis Attacks on Smartcards|&do=get]]
Line 7: Line 10:
[[attachment:[CRR02] 2002 - CHES - Template Attacks.pdf|[CRR02] 2002 - CHES - Template Attacks]] [[attachment:[CRR02] 2002 - CHES - Template Attacks.pdf|[CRR02] 2002 - CHES - Template Attacks|&do=get]]
Line 9: Line 12:
[[attachment:[BCO04] 2004 - CHES - Correlation Power Analysis with a Leakage Model.pdf|[BCO04] 2004 - CHES - Correlation Power Analysis with a Leakage Model]] [[attachment:[BCO04] 2004 - CHES - Correlation Power Analysis with a Leakage Model.pdf|[BCO04] 2004 - CHES - Correlation Power Analysis with a Leakage Model|&do=get]]
Line 11: Line 14:
[[attachment:[SLP05] 2005 - CHES - A Stochastic Model for Differential Side Channel Cryptanalysis.pdf|[SLP05] 2005 - CHES - A Stochastic Model for Differential Side Channel Cryptanalysis]] [[attachment:[SLP05] 2005 - CHES - A Stochastic Model for Differential Side Channel Cryptanalysis.pdf|[SLP05] 2005 - CHES - A Stochastic Model for Differential Side Channel Cryptanalysis|&do=get]]
Line 13: Line 16:
[[attachment:[PSQ07] 2007 - VLSI J. - Power and Electromagnetic Analysis Improved Model, Consequences and Comparisons.pdf|[PSQ07] 2007 - VLSI J. - Power and Electromagnetic Analysis Improved Model, Consequences and Comparisons]] [[attachment:[PSQ07] 2007 - VLSI J. - Power and Electromagnetic Analysis Improved Model, Consequences and Comparisons.pdf|[PSQ07] 2007 - VLSI J. - Power and Electromagnetic Analysis Improved Model, Consequences and Comparisons|&do=get]]

Voici quelques articles abordant la modélisation de la fuite physique (souvent dans le but d'introduire une nouvelle technique d'attaque).

[MDS99] observe le modèle du poids de Hamming avec bruit Gaussien. [CRR02] introduit le modèle du bruit Gaussien multi varié (avec fonction de fuite quelconque). [BCO04] introduit le modèle de la distance de Hamming. [SLP05] généralise le modèle du poids (distance) de Hamming au cas où les bits ont différents poids. [PSQ07] étend le modèle de la distance de Hamming en différenciant les transitions 0->1 et 1->0. Ces articles ont une approche assez expérimentale: la fuite est modélisée de façon intuitive et le modèle est ensuite vérifié expérimentalement.

[MDS99] 1999 - USENIX - Investigations of Power Analysis Attacks on Smartcards

[CRR02] 2002 - CHES - Template Attacks

[BCO04] 2004 - CHES - Correlation Power Analysis with a Leakage Model

[SLP05] 2005 - CHES - A Stochastic Model for Differential Side Channel Cryptanalysis

[PSQ07] 2007 - VLSI J. - Power and Electromagnetic Analysis Improved Model, Consequences and Comparisons