Correlation Power Analysis with a Leakage Model
Citations
934 citations
618 citations
574 citations
Additional excerpts
...Similarly, if CPA is successful at recovering the key, additional leakage modes may also be present....
[...]
...It can also be used for black-box evaluations as long as there is some correlation between the actual leakages of the device and the leakage model being used for CPA....
[...]
...5.1 Correlation power analysis Correlation power analysis (CPA) [37] involves evaluating the degree of correlation between variations within the set of measurements and a model of device leakage that depends on the value of (or a function of) one or more intermediates in the cryptographic calculation....
[...]
...Correlation power analysis (CPA) [37] involves evaluating...
[...]
...In contrast to CPA, template attacks build a model from actual power measurements or simulations....
[...]
479 citations
371 citations
References
6,757 citations
1,554 citations
1,362 citations
778 citations
631 citations