From theory to practice: horizontal attacks on protected implementations of modular exponentiations View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2019-04

AUTHORS

Ibrahima Diop, Yanis Linge, Thomas Ordas, Pierre-Yvan Liardet, Philippe Maurine

ABSTRACT

Nowadays, horizontal or single-shot side-channel attacks against protected implementations of RSA and similar algorithms constitute a theoretic threat against secure devices. Nevertheless, in practice their application remains very difficult not only because of their complexity, but also because of environmental countermeasures integrated by designers that render their application even more difficult. Horizontal side-channel attacks take place in multiple steps. Among them, the most important are the acquisition of a complete trace with a sufficiently high sampling rate, its cutting into regular patterns, the realignment of the obtained patterns, the reduction as far as possible of noise in the acquired trace, the identification of the points of interest and the application of an effective distinguisher. Each of these steps is crucial and leads, if performed without enough attention, to an unsuccessful attack. In this context, this paper introduces effective solutions to efficiently perform all these steps, i.e., practicable means for implementing efficient horizontal attacks. More... »

PAGES

1-16

References to SciGraph publications

  • 2003-02-17. Template Attacks in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002
  • 2011. Improving Differential Power Analysis by Elastic Alignment in TOPICS IN CRYPTOLOGY – CT-RSA 2011
  • 2014. Attacking Randomized Exponentiations Using Unsupervised Learning in CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN
  • 2016. From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2016
  • 2001-09-20. Sliding Windows Succumbs to Big Mac Attack in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS — CHES 2001
  • 2015. Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace in TOPICS IN CRYPTOLOGY –- CT-RSA 2015
  • 2001-09-20. Electromagnetic Analysis: Concrete Results in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS — CHES 2001
  • 2003. A New Class of Collision Attacks and Its Application to DES in FAST SOFTWARE ENCRYPTION
  • 2012. ROSETTA for Single Trace Analysis in PROGRESS IN CRYPTOLOGY - INDOCRYPT 2012
  • 1999. Differential Power Analysis in ADVANCES IN CRYPTOLOGY — CRYPTO’ 99
  • 2003-02-17. Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002
  • 2006. Template Attacks in Principal Subspaces in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006
  • 2010. Horizontal Correlation Analysis on Exponentiation in INFORMATION AND COMMUNICATIONS SECURITY
  • 2002-02-08. Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS
  • 2005. Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption in PROGRESS IN CRYPTOLOGY – MYCRYPT 2005
  • 2014-09. A model of the leakage in the frequency domain and its application to CPA and DPA in JOURNAL OF CRYPTOGRAPHIC ENGINEERING
  • 2006. High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006
  • 2016. Collision for Estimating SCA Measurement Quality and Related Applications in SMART CARD RESEARCH AND ADVANCED APPLICATIONS
  • 2004. Correlation Power Analysis with a Leakage Model in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004
  • 2004. Hardware Countermeasures against DPA – A Statistical Analysis of Their Effectiveness in TOPICS IN CRYPTOLOGY – CT-RSA 2004
  • 2004. Leak Resistant Arithmetic in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004
  • 2003-02-17. The Montgomery Powering Ladder in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002
  • 2014. Clustering Algorithms for Non-profiled Single-Execution Attacks on Exponentiations in SMART CARD RESEARCH AND ADVANCED APPLICATIONS
  • 2003. The Doubling Attack – Why Upwards Is Better than Downwards in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2003
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s13389-018-0181-1

    DOI

    http://dx.doi.org/10.1007/s13389-018-0181-1

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1100655042


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Mines Saint-Etienne", 
              "id": "https://www.grid.ac/institutes/grid.424462.2", 
              "name": [
                "STMicroelectronics, Rousset, France", 
                "Ecole Nationale Superieure des Mines de Saint-\u00c9tienne, EMSE 880 route de Mimet, 13541, Gardanne, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Diop", 
            "givenName": "Ibrahima", 
            "id": "sg:person.01251234627.58", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01251234627.58"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "STMicroelectronics (France)", 
              "id": "https://www.grid.ac/institutes/grid.6625.7", 
              "name": [
                "STMicroelectronics, Rousset, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Linge", 
            "givenName": "Yanis", 
            "id": "sg:person.013400774325.98", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013400774325.98"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "STMicroelectronics (France)", 
              "id": "https://www.grid.ac/institutes/grid.6625.7", 
              "name": [
                "STMicroelectronics, Rousset, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Ordas", 
            "givenName": "Thomas", 
            "id": "sg:person.012132331463.18", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012132331463.18"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "STMicroelectronics (France)", 
              "id": "https://www.grid.ac/institutes/grid.6625.7", 
              "name": [
                "STMicroelectronics, Rousset, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Liardet", 
            "givenName": "Pierre-Yvan", 
            "id": "sg:person.013316764656.11", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013316764656.11"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of Montpellier", 
              "id": "https://www.grid.ac/institutes/grid.121334.6", 
              "name": [
                "LIRMM, Universit\u00e9 Montpellier II, Zone Industrielle,190 Avenue Coq, 13106, Rousset, France", 
                "CEA Commissariat \u00e0 l\u2019\u00c9nergie Atomique et aux \u00c9nergies Alternatives, 880 route de Mimet, 13120, Gardanne, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Maurine", 
            "givenName": "Philippe", 
            "id": "sg:person.015270700055.92", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015270700055.92"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/3-540-48405-1_25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005179729", 
              "https://doi.org/10.1007/3-540-48405-1_25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-49890-3_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005804777", 
              "https://doi.org/10.1007/978-3-662-49890-3_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-34931-7_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005809090", 
              "https://doi.org/10.1007/978-3-642-34931-7_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36400-5_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006935456", 
              "https://doi.org/10.1007/3-540-36400-5_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36400-5_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006935456", 
              "https://doi.org/10.1007/3-540-36400-5_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/359340.359342", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013337011"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36400-5_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015605827", 
              "https://doi.org/10.1007/3-540-36400-5_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36400-5_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015605827", 
              "https://doi.org/10.1007/3-540-36400-5_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-24660-2_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017946371", 
              "https://doi.org/10.1007/978-3-540-24660-2_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-24660-2_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017946371", 
              "https://doi.org/10.1007/978-3-540-24660-2_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-10175-0_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018030754", 
              "https://doi.org/10.1007/978-3-319-10175-0_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11894063_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020515823", 
              "https://doi.org/10.1007/11894063_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11894063_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020515823", 
              "https://doi.org/10.1007/11894063_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11894063_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032335856", 
              "https://doi.org/10.1007/11894063_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11894063_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032335856", 
              "https://doi.org/10.1007/11894063_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-19074-2_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032456956", 
              "https://doi.org/10.1007/978-3-642-19074-2_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-19074-2_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032456956", 
              "https://doi.org/10.1007/978-3-642-19074-2_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44709-1_24", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032727747", 
              "https://doi.org/10.1007/3-540-44709-1_24"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44709-1_24", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032727747", 
              "https://doi.org/10.1007/3-540-44709-1_24"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-39887-5_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034399384", 
              "https://doi.org/10.1007/978-3-540-39887-5_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-39887-5_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034399384", 
              "https://doi.org/10.1007/978-3-540-39887-5_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-08302-5_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037625465", 
              "https://doi.org/10.1007/978-3-319-08302-5_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-17650-0_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037662158", 
              "https://doi.org/10.1007/978-3-642-17650-0_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-17650-0_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037662158", 
              "https://doi.org/10.1007/978-3-642-17650-0_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-16715-2_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041673862", 
              "https://doi.org/10.1007/978-3-319-16715-2_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11554868_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044993031", 
              "https://doi.org/10.1007/11554868_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11554868_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044993031", 
              "https://doi.org/10.1007/11554868_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36400-5_3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046361832", 
              "https://doi.org/10.1007/3-540-36400-5_3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36400-5_3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046361832", 
              "https://doi.org/10.1007/3-540-36400-5_3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-31271-2_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046572957", 
              "https://doi.org/10.1007/978-3-319-31271-2_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-28632-5_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046806925", 
              "https://doi.org/10.1007/978-3-540-28632-5_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-28632-5_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046806925", 
              "https://doi.org/10.1007/978-3-540-28632-5_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-28632-5_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047076810", 
              "https://doi.org/10.1007/978-3-540-28632-5_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s13389-014-0074-x", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047999929", 
              "https://doi.org/10.1007/s13389-014-0074-x"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44709-1_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050348700", 
              "https://doi.org/10.1007/3-540-44709-1_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44709-1_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050348700", 
              "https://doi.org/10.1007/3-540-44709-1_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1090/s0025-5718-1987-0866113-7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050650230"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-45238-6_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050904217", 
              "https://doi.org/10.1007/978-3-540-45238-6_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-45238-6_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050904217", 
              "https://doi.org/10.1007/978-3-540-45238-6_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48059-5_25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052095997", 
              "https://doi.org/10.1007/3-540-48059-5_25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48059-5_25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052095997", 
              "https://doi.org/10.1007/3-540-48059-5_25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1873548.1873552", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053627605"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/12.869328", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061089187"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tc.2004.13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061533986"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/dsd.2015.24", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094130795"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2019-04", 
        "datePublishedReg": "2019-04-01", 
        "description": "Nowadays, horizontal or single-shot side-channel attacks against protected implementations of RSA and similar algorithms constitute a theoretic threat against secure devices. Nevertheless, in practice their application remains very difficult not only because of their complexity, but also because of environmental countermeasures integrated by designers that render their application even more difficult. Horizontal side-channel attacks take place in multiple steps. Among them, the most important are the acquisition of a complete trace with a sufficiently high sampling rate, its cutting into regular patterns, the realignment of the obtained patterns, the reduction as far as possible of noise in the acquired trace, the identification of the points of interest and the application of an effective distinguisher. Each of these steps is crucial and leads, if performed without enough attention, to an unsuccessful attack. In this context, this paper introduces effective solutions to efficiently perform all these steps, i.e., practicable means for implementing efficient horizontal attacks.", 
        "genre": "research_article", 
        "id": "sg:pub.10.1007/s13389-018-0181-1", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1136625", 
            "issn": [
              "2190-8508", 
              "2190-8516"
            ], 
            "name": "Journal of Cryptographic Engineering", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "1", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "9"
          }
        ], 
        "name": "From theory to practice: horizontal attacks on protected implementations of modular exponentiations", 
        "pagination": "1-16", 
        "productId": [
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "ccc65a6a635f04a2913f62fee8bca80ef4d72ac0f7e753221eaca9efed5f9c41"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s13389-018-0181-1"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1100655042"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s13389-018-0181-1", 
          "https://app.dimensions.ai/details/publication/pub.1100655042"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2019-04-11T14:19", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000372_0000000372/records_117112_00000003.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://link.springer.com/10.1007%2Fs13389-018-0181-1"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s13389-018-0181-1'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s13389-018-0181-1'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s13389-018-0181-1'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s13389-018-0181-1'


     

    This table displays all metadata directly associated to this object as RDF triples.

    211 TRIPLES      21 PREDICATES      57 URIs      19 LITERALS      7 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s13389-018-0181-1 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N7f8e596c1ba04732971fbc0152301fea
    4 schema:citation sg:pub.10.1007/11554868_13
    5 sg:pub.10.1007/11894063_1
    6 sg:pub.10.1007/11894063_15
    7 sg:pub.10.1007/3-540-36400-5_11
    8 sg:pub.10.1007/3-540-36400-5_22
    9 sg:pub.10.1007/3-540-36400-5_3
    10 sg:pub.10.1007/3-540-44709-1_21
    11 sg:pub.10.1007/3-540-44709-1_24
    12 sg:pub.10.1007/3-540-48059-5_25
    13 sg:pub.10.1007/3-540-48405-1_25
    14 sg:pub.10.1007/978-3-319-08302-5_6
    15 sg:pub.10.1007/978-3-319-10175-0_11
    16 sg:pub.10.1007/978-3-319-16715-2_23
    17 sg:pub.10.1007/978-3-319-31271-2_9
    18 sg:pub.10.1007/978-3-540-24660-2_18
    19 sg:pub.10.1007/978-3-540-28632-5_2
    20 sg:pub.10.1007/978-3-540-28632-5_5
    21 sg:pub.10.1007/978-3-540-39887-5_16
    22 sg:pub.10.1007/978-3-540-45238-6_22
    23 sg:pub.10.1007/978-3-642-17650-0_5
    24 sg:pub.10.1007/978-3-642-19074-2_8
    25 sg:pub.10.1007/978-3-642-34931-7_9
    26 sg:pub.10.1007/978-3-662-49890-3_10
    27 sg:pub.10.1007/s13389-014-0074-x
    28 https://doi.org/10.1090/s0025-5718-1987-0866113-7
    29 https://doi.org/10.1109/12.869328
    30 https://doi.org/10.1109/dsd.2015.24
    31 https://doi.org/10.1109/tc.2004.13
    32 https://doi.org/10.1145/1873548.1873552
    33 https://doi.org/10.1145/359340.359342
    34 schema:datePublished 2019-04
    35 schema:datePublishedReg 2019-04-01
    36 schema:description Nowadays, horizontal or single-shot side-channel attacks against protected implementations of RSA and similar algorithms constitute a theoretic threat against secure devices. Nevertheless, in practice their application remains very difficult not only because of their complexity, but also because of environmental countermeasures integrated by designers that render their application even more difficult. Horizontal side-channel attacks take place in multiple steps. Among them, the most important are the acquisition of a complete trace with a sufficiently high sampling rate, its cutting into regular patterns, the realignment of the obtained patterns, the reduction as far as possible of noise in the acquired trace, the identification of the points of interest and the application of an effective distinguisher. Each of these steps is crucial and leads, if performed without enough attention, to an unsuccessful attack. In this context, this paper introduces effective solutions to efficiently perform all these steps, i.e., practicable means for implementing efficient horizontal attacks.
    37 schema:genre research_article
    38 schema:inLanguage en
    39 schema:isAccessibleForFree false
    40 schema:isPartOf N1f3344b67ed14a28a207d735fa9b4887
    41 N975ff097cdb54a5695e0f74c14139459
    42 sg:journal.1136625
    43 schema:name From theory to practice: horizontal attacks on protected implementations of modular exponentiations
    44 schema:pagination 1-16
    45 schema:productId N114d2990b648409cb85a16da28c02042
    46 Naad1e21eade649ebb61a3adb0d58d034
    47 Nb551c87412f54b50b729c06446aa5557
    48 schema:sameAs https://app.dimensions.ai/details/publication/pub.1100655042
    49 https://doi.org/10.1007/s13389-018-0181-1
    50 schema:sdDatePublished 2019-04-11T14:19
    51 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    52 schema:sdPublisher N5c984efa577d4d7bba1d2b5f928f7284
    53 schema:url https://link.springer.com/10.1007%2Fs13389-018-0181-1
    54 sgo:license sg:explorer/license/
    55 sgo:sdDataset articles
    56 rdf:type schema:ScholarlyArticle
    57 N114d2990b648409cb85a16da28c02042 schema:name doi
    58 schema:value 10.1007/s13389-018-0181-1
    59 rdf:type schema:PropertyValue
    60 N1f3344b67ed14a28a207d735fa9b4887 schema:issueNumber 1
    61 rdf:type schema:PublicationIssue
    62 N3b68c7ab5b304e56ba0ab297fff0f6ba rdf:first sg:person.015270700055.92
    63 rdf:rest rdf:nil
    64 N5c984efa577d4d7bba1d2b5f928f7284 schema:name Springer Nature - SN SciGraph project
    65 rdf:type schema:Organization
    66 N63da33053b314ac7a98617d863ff5d2f rdf:first sg:person.012132331463.18
    67 rdf:rest Na5a41e8497d6446fb29b82c2a8bd3ebe
    68 N7f8e596c1ba04732971fbc0152301fea rdf:first sg:person.01251234627.58
    69 rdf:rest Nc149c0dee4af49d38c3f57f162248895
    70 N975ff097cdb54a5695e0f74c14139459 schema:volumeNumber 9
    71 rdf:type schema:PublicationVolume
    72 Na5a41e8497d6446fb29b82c2a8bd3ebe rdf:first sg:person.013316764656.11
    73 rdf:rest N3b68c7ab5b304e56ba0ab297fff0f6ba
    74 Naad1e21eade649ebb61a3adb0d58d034 schema:name readcube_id
    75 schema:value ccc65a6a635f04a2913f62fee8bca80ef4d72ac0f7e753221eaca9efed5f9c41
    76 rdf:type schema:PropertyValue
    77 Nb551c87412f54b50b729c06446aa5557 schema:name dimensions_id
    78 schema:value pub.1100655042
    79 rdf:type schema:PropertyValue
    80 Nc149c0dee4af49d38c3f57f162248895 rdf:first sg:person.013400774325.98
    81 rdf:rest N63da33053b314ac7a98617d863ff5d2f
    82 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    83 schema:name Information and Computing Sciences
    84 rdf:type schema:DefinedTerm
    85 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    86 schema:name Data Format
    87 rdf:type schema:DefinedTerm
    88 sg:journal.1136625 schema:issn 2190-8508
    89 2190-8516
    90 schema:name Journal of Cryptographic Engineering
    91 rdf:type schema:Periodical
    92 sg:person.012132331463.18 schema:affiliation https://www.grid.ac/institutes/grid.6625.7
    93 schema:familyName Ordas
    94 schema:givenName Thomas
    95 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012132331463.18
    96 rdf:type schema:Person
    97 sg:person.01251234627.58 schema:affiliation https://www.grid.ac/institutes/grid.424462.2
    98 schema:familyName Diop
    99 schema:givenName Ibrahima
    100 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01251234627.58
    101 rdf:type schema:Person
    102 sg:person.013316764656.11 schema:affiliation https://www.grid.ac/institutes/grid.6625.7
    103 schema:familyName Liardet
    104 schema:givenName Pierre-Yvan
    105 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013316764656.11
    106 rdf:type schema:Person
    107 sg:person.013400774325.98 schema:affiliation https://www.grid.ac/institutes/grid.6625.7
    108 schema:familyName Linge
    109 schema:givenName Yanis
    110 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013400774325.98
    111 rdf:type schema:Person
    112 sg:person.015270700055.92 schema:affiliation https://www.grid.ac/institutes/grid.121334.6
    113 schema:familyName Maurine
    114 schema:givenName Philippe
    115 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015270700055.92
    116 rdf:type schema:Person
    117 sg:pub.10.1007/11554868_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044993031
    118 https://doi.org/10.1007/11554868_13
    119 rdf:type schema:CreativeWork
    120 sg:pub.10.1007/11894063_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020515823
    121 https://doi.org/10.1007/11894063_1
    122 rdf:type schema:CreativeWork
    123 sg:pub.10.1007/11894063_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032335856
    124 https://doi.org/10.1007/11894063_15
    125 rdf:type schema:CreativeWork
    126 sg:pub.10.1007/3-540-36400-5_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015605827
    127 https://doi.org/10.1007/3-540-36400-5_11
    128 rdf:type schema:CreativeWork
    129 sg:pub.10.1007/3-540-36400-5_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006935456
    130 https://doi.org/10.1007/3-540-36400-5_22
    131 rdf:type schema:CreativeWork
    132 sg:pub.10.1007/3-540-36400-5_3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046361832
    133 https://doi.org/10.1007/3-540-36400-5_3
    134 rdf:type schema:CreativeWork
    135 sg:pub.10.1007/3-540-44709-1_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050348700
    136 https://doi.org/10.1007/3-540-44709-1_21
    137 rdf:type schema:CreativeWork
    138 sg:pub.10.1007/3-540-44709-1_24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032727747
    139 https://doi.org/10.1007/3-540-44709-1_24
    140 rdf:type schema:CreativeWork
    141 sg:pub.10.1007/3-540-48059-5_25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052095997
    142 https://doi.org/10.1007/3-540-48059-5_25
    143 rdf:type schema:CreativeWork
    144 sg:pub.10.1007/3-540-48405-1_25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005179729
    145 https://doi.org/10.1007/3-540-48405-1_25
    146 rdf:type schema:CreativeWork
    147 sg:pub.10.1007/978-3-319-08302-5_6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037625465
    148 https://doi.org/10.1007/978-3-319-08302-5_6
    149 rdf:type schema:CreativeWork
    150 sg:pub.10.1007/978-3-319-10175-0_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018030754
    151 https://doi.org/10.1007/978-3-319-10175-0_11
    152 rdf:type schema:CreativeWork
    153 sg:pub.10.1007/978-3-319-16715-2_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041673862
    154 https://doi.org/10.1007/978-3-319-16715-2_23
    155 rdf:type schema:CreativeWork
    156 sg:pub.10.1007/978-3-319-31271-2_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046572957
    157 https://doi.org/10.1007/978-3-319-31271-2_9
    158 rdf:type schema:CreativeWork
    159 sg:pub.10.1007/978-3-540-24660-2_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017946371
    160 https://doi.org/10.1007/978-3-540-24660-2_18
    161 rdf:type schema:CreativeWork
    162 sg:pub.10.1007/978-3-540-28632-5_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046806925
    163 https://doi.org/10.1007/978-3-540-28632-5_2
    164 rdf:type schema:CreativeWork
    165 sg:pub.10.1007/978-3-540-28632-5_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047076810
    166 https://doi.org/10.1007/978-3-540-28632-5_5
    167 rdf:type schema:CreativeWork
    168 sg:pub.10.1007/978-3-540-39887-5_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034399384
    169 https://doi.org/10.1007/978-3-540-39887-5_16
    170 rdf:type schema:CreativeWork
    171 sg:pub.10.1007/978-3-540-45238-6_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050904217
    172 https://doi.org/10.1007/978-3-540-45238-6_22
    173 rdf:type schema:CreativeWork
    174 sg:pub.10.1007/978-3-642-17650-0_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037662158
    175 https://doi.org/10.1007/978-3-642-17650-0_5
    176 rdf:type schema:CreativeWork
    177 sg:pub.10.1007/978-3-642-19074-2_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032456956
    178 https://doi.org/10.1007/978-3-642-19074-2_8
    179 rdf:type schema:CreativeWork
    180 sg:pub.10.1007/978-3-642-34931-7_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005809090
    181 https://doi.org/10.1007/978-3-642-34931-7_9
    182 rdf:type schema:CreativeWork
    183 sg:pub.10.1007/978-3-662-49890-3_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005804777
    184 https://doi.org/10.1007/978-3-662-49890-3_10
    185 rdf:type schema:CreativeWork
    186 sg:pub.10.1007/s13389-014-0074-x schema:sameAs https://app.dimensions.ai/details/publication/pub.1047999929
    187 https://doi.org/10.1007/s13389-014-0074-x
    188 rdf:type schema:CreativeWork
    189 https://doi.org/10.1090/s0025-5718-1987-0866113-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050650230
    190 rdf:type schema:CreativeWork
    191 https://doi.org/10.1109/12.869328 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061089187
    192 rdf:type schema:CreativeWork
    193 https://doi.org/10.1109/dsd.2015.24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094130795
    194 rdf:type schema:CreativeWork
    195 https://doi.org/10.1109/tc.2004.13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061533986
    196 rdf:type schema:CreativeWork
    197 https://doi.org/10.1145/1873548.1873552 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053627605
    198 rdf:type schema:CreativeWork
    199 https://doi.org/10.1145/359340.359342 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013337011
    200 rdf:type schema:CreativeWork
    201 https://www.grid.ac/institutes/grid.121334.6 schema:alternateName University of Montpellier
    202 schema:name CEA Commissariat à l’Énergie Atomique et aux Énergies Alternatives, 880 route de Mimet, 13120, Gardanne, France
    203 LIRMM, Université Montpellier II, Zone Industrielle,190 Avenue Coq, 13106, Rousset, France
    204 rdf:type schema:Organization
    205 https://www.grid.ac/institutes/grid.424462.2 schema:alternateName Mines Saint-Etienne
    206 schema:name Ecole Nationale Superieure des Mines de Saint-Étienne, EMSE 880 route de Mimet, 13541, Gardanne, France
    207 STMicroelectronics, Rousset, France
    208 rdf:type schema:Organization
    209 https://www.grid.ac/institutes/grid.6625.7 schema:alternateName STMicroelectronics (France)
    210 schema:name STMicroelectronics, Rousset, France
    211 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...