[Resource Topic] 2005/311: What do S-boxes Say in Differential Side Channel Attacks?

Welcome to the resource topic for 2005/311

What do S-boxes Say in Differential Side Channel Attacks?

Authors: Cecile Canovas, Jessy Clediere


Cryptographic devices are vulnerable against the now well-known side channel leakage analysis. Secret data, such as keys, can be revealed by attacks like DPA, DEMA, CPA. However, this kind of attacks also exhibits wrong keys, this phenomenon being known as the “ghost peaks” problem and has been briefly explained in CPA. We give here a comprehension and analysis of the ghost peak problem that occurs in differential analysis regarding to different power consumption model and various weighting techniques.

ePrint: https://eprint.iacr.org/2005/311

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .