Skip to main content

and
  1. Chapter and Conference Paper

    Fast Leakage Assessment

    We describe a fast technique for performing the computationally heavy part of leakage assessment, in any statistical moment (or other property) of the leakage samples distributions. The proposed technique outp...

    Oscar Reparaz, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2017)

  2. No Access

    Chapter and Conference Paper

    Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip

    We propose a new class of distinguishers for differential side-channel analysis based on nonparametric statistics. As an example we use Spearman’s rank correlation coefficient. We present a comparative study o...

    Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust in Information Security (2008)

  3. Chapter and Conference Paper

    Mutual Information Analysis

    We propose a generic information-theoretic distinguisher for differential side-channel analysis. Our model of side-channel leakage is a refinement of the one given by Standaert et al. An embedded device containin...

    Benedikt Gierlichs, Lejla Batina, Pim Tuyls in Cryptographic Hardware and Embedded System… (2008)

  4. Chapter and Conference Paper

    Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration

    Dynamically reconfigurable systems are known to have many advantages such as area and power reduction. The drawbacks of these systems are the reconfiguration delay and the overhead needed to provide reconfigur...

    Nele Mentens, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2008)

  5. Chapter and Conference Paper

    DPA-Resistance Without Routing Constraints?

    MDPL is a logic style claiming to provide resistance against Differential Side Channel Analysis on power consumption measurements. In this paper we show that the power consumption of a non-linear MDPL gate can...

    Benedikt Gierlichs in Cryptographic Hardware and Embedded Systems - CHES 2007 (2007)

  6. Chapter and Conference Paper

    Templates vs. Stochastic Methods

    Template Attacks and the Stochastic Model provide advanced methods for side channel cryptanalysis that make use of ‘a-priori’ knowledge gained from a profiling step. For a systematic comparison of Template Att...

    Benedikt Gierlichs, Kerstin Lemke-Rust in Cryptographic Hardware and Embedded System… (2006)