期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Information Theoretic Distinguishers for Timing Attacks with Partial Profiles: Solving the Empty Bin Issue
1
作者 Eloi De Chérisey Sylvain Guilley +1 位作者 Olivier Rioul Darshana Jayasinghe 《Journal of Information Security》 2021年第1期1-33,共33页
In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s values. The profiling phase is essential to obtain an accurate leakage model, yet it may not be exh... In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s values. The profiling phase is essential to obtain an accurate leakage model, yet it may not be exhaustive. As a result, information theoretic distinguishers may come up on previously unseen data, a phenomenon yielding empty bins. A strict application of the maximum likelihood method yields a distinguisher that is not even sound. Ignoring empty bins reestablishes soundness, but seriously limits its performance in terms of success rate. The purpose of this paper is to remedy this situation. In this research, we propose six different techniques to improve the performance of information theoretic distinguishers. We study t</span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">hem thoroughly by applying them to timing attacks, both with synthetic and real leakages. Namely, we compare them in terms of success rate, and show that their performance depends on the amount of profiling, and can be explained by a bias-variance analysis. The result of our work is that there exist use-cases, especially when measurements are noisy, where our novel information theoretic distinguishers (typically the soft-drop distinguisher) perform the best compared to known side-channel distinguishers, despite the empty bin situation. 展开更多
关键词 Timing Attacks Profiling Attacks Dirichlet Priors Success Rates
下载PDF
Self-Dual Hadamard Bent Sequences
2
作者 SHI Minjia LI Yaya +3 位作者 CHENG Wei CRNKOVIC Dean KROTOV Denis SOLéPatrick 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2023年第2期894-908,共15页
A new notion of bent sequence related to Hadamard matrices was introduced recently,motivated by a security application(Solé,et al.,2021).The authors study the self-dual class in length at most 196.The authors use... A new notion of bent sequence related to Hadamard matrices was introduced recently,motivated by a security application(Solé,et al.,2021).The authors study the self-dual class in length at most 196.The authors use three competing methods of generation:Exhaustion,Linear Algebra and Gr?bner bases.Regular Hadamard matrices and Bush-type Hadamard matrices provide many examples.The authors conjecture that if v is an even perfect square,a self-dual bent sequence of length v always exists.The authors introduce the strong automorphism group of Hadamard matrices,which acts on their associated self-dual bent sequences.The authors give an efficient algorithm to compute that group. 展开更多
关键词 Bent sequences bush-type Hadamard matrices Hadanard matrices PUF functions regular Hadamard matrices
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部