Template Attacks with a Power Model, Cryptology ePrint Archive Report, vol.443443, 2007. ,
Combined Side-Channel Attacks, WISA, pp.175-190, 2010. ,
The EM Side???Channel(s), CHES '02: Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems, pp.29-45, 2003. ,
DOI : 10.1007/3-540-36400-5_4
Multi-channel Attacks, CHES, pp.2-16, 2003. ,
DOI : 10.1007/978-3-540-45238-6_2
Can Code Polymorphism Limit Information Leakage?, WISTP, pp.1-21, 2011. ,
DOI : 10.1007/978-3-642-21040-2_1
URL : https://hal.archives-ouvertes.fr/hal-01110259
A smart random code injection to mask power analysis based side channel attacks, Proceedings of the 5th IEEE/ACM international conference on Hardware/software codesign and system synthesis , CODES+ISSS '07, pp.51-56, 2007. ,
DOI : 10.1145/1289816.1289832
Multivariate denoising using wavelets and principal component analysis, Computational Statistics & Data Analysis, vol.50, issue.9, pp.2381-2398, 2006. ,
DOI : 10.1016/j.csda.2004.12.010
Statistical methods for comparative studies: techniques for bias reduction, Wiley series in probability and mathematical statistics: Applied probability and statistics, 1980. ,
DOI : 10.1002/9780470316498
Template Attacks in Principal Subspaces, CHES, pp.1-14, 2006. ,
DOI : 10.1007/11894063_1
Improvement of an extended kalman filter power line interference suppressor for ecg signals ,
Multiscale PCA with application to multivariate statistical process monitoring, AIChE Journal, vol.36, issue.7, pp.1596-1610, 1998. ,
DOI : 10.1002/aic.690440712
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.658
Estimation with applications to tracking and navigation, 2001. ,
DOI : 10.1002/0471221279
Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip, ISC, pp.341-354, 2008. ,
DOI : 10.1007/978-3-540-85886-7_24
Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow, in ReConFig, Seoul, Korea. REFERENCES [21], pp.327-342, 2002. ,
Parameter estimation for scientists and engineers, 2007. ,
Ocean Weather Forecasting. An Integrated View of Oceanography, 2006. ,
Correlation Power Analysis with a Leakage Model, CHES, pp.16-29, 2004. ,
DOI : 10.1007/978-3-540-28632-5_2
Tracking and Kalman Filtering Made Easy, 2008. ,
DOI : 10.1002/0471224197
Discrete Fourier Analysis and Wavelets: Applications to Signal and Image Processing, 2011. ,
DOI : 10.1002/9781118032442
Bayesian Signal Processing: Classical, Modern and Particle Filtering Methods, Adaptive and Learning Systems for Signal Processing, Communications and Control Series, 2011. ,
Towards Sound Approaches to Counteract Power-Analysis Attacks, CRYPTO, pp.3-540, 1999. ,
DOI : 10.1007/3-540-48405-1_26
Template Attacks, CHES, pp.13-28, 2002. ,
DOI : 10.1007/3-540-36400-5_3
Forecasting,structural time series models and the Kalman filter, 2008. ,
Differential Power Analysis in the Presence of Hardware Countermeasures, CHES, pp.252-263, 2000. ,
DOI : 10.1007/3-540-44499-8_20
Application of attack potential to smartcards v2- 5, 2008. ,
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009, CHES, pp.95-109, 2009. ,
DOI : 10.1007/978-3-642-15031-9_7
Statistique thorique et applique, Infrence statistique une et deux dimensions, 2006. ,
Public-Key Cryptography: Theory and Practice, Pearson Education, 2009. ,
Spectral Coherence Analysis -First Experimental Results -. Cryptology ePrint Archive, 2011. ,
Maximum likelihood from incomplete data via the em algorithm, Journal of the Royal Statistical Society, pp.39-40, 1977. ,
Univariate side channel attacks and leakage modeling, Journal of Cryptographic Engineering, vol.34, issue.9, pp.123-144, 2011. ,
DOI : 10.1007/s13389-011-0010-2
Multisensor data fusion, in pringer Handbook of, pp.585-610, 2008. ,
Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?, Computers Security, 1985. ,
Introduction to optimal estimation Advanced textbooks in control and signal processing Control and Signal Processing Series, 1999. ,
Theory of communication, Journal of the Institution of Electrical Engineers - Part I: General, vol.94, issue.73, pp.429-457, 1946. ,
DOI : 10.1049/ji-1.1947.0015
Side-Channel based Watermarks for IP Protection, in COSADE, pp.47-50, 2010. ,
Revisiting Higher-Order DPA Attacks:, CT- RSA, pp.221-234, 2010. ,
DOI : 10.1007/978-3-642-11925-5_16
Mutual Information Analysis ? A Universal Differential Side-Channel Attack, Cryptology ePrint Archive Report, 2007. ,
Mutual Information Analysis, CHES, 10th International Workshop, pp.426-442, 2008. ,
DOI : 10.1007/978-3-540-85053-3_27
Empirical comparison of side channel analysis distinguishers on DES in hardware, 2009 European Conference on Circuit Theory and Design, pp.391-394, 2009. ,
DOI : 10.1109/ECCTD.2009.5275003
An Analysis of Variance for Categorical Data, Journal of the American Statistical Association, vol.20, issue.2, pp.534-544, 1912. ,
DOI : 10.1080/14786440009463897
Essentials of statistics for the behavioral sciences, 2008. ,
Geometrical Counter-Measures against Side-Channel Attacks, pp.2007-2010, 2007. ,
Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks, IEEE Transactions on Computers, vol.57, issue.11, pp.1482-1497, 2008. ,
DOI : 10.1109/TC.2008.109
A Fast Pipelined Multi-Mode DES Architecture Operating in IP Representation, Integration, The VLSI Journal, pp.479-489, 2007. ,
Formal Framework for the Evaluation of Waveform Resynchronization Algorithms, WISTP, 2011. ,
DOI : 10.1007/978-3-642-21040-2_7
Fault Injection Resilience, in FDTC, IEEE Computer Society, pp.51-65, 2010. ,
Silicon-level Solutions to Counteract Passive and Active Attacks, 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.3-17, 2008. ,
DOI : 10.1109/FDTC.2008.18
URL : https://hal.archives-ouvertes.fr/hal-00311431
Society, I. Antennas, and P. Society, Electromagnetic anechoic chambers: a fundamental design and specification guide, 2002. ,
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching, CHES, pp.187-200, 2006. ,
DOI : 10.1007/11894063_15
The Variance Power Attack, COSADE, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-00479595
Private Circuits: Securing Hardware against Probing Attacks, CRYPTO, pp.463-481, 2003. ,
DOI : 10.1007/978-3-540-45146-4_27
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.9436
Analyzing Attribute Dependencies, PKDD 2003, volume 2838 of LNAI, pp.229-240, 2003. ,
DOI : 10.1007/978-3-540-39804-2_22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.7148
Curve alignment by moments, The Annals of Applied Statistics, vol.1, issue.2, pp.480-501, 2007. ,
DOI : 10.1214/07-AOAS127
A tutorial on iterative probabilistic decoding and channel estimation: Graph representation, information flow and probabilistic algorithm in decoding and communication, 2005. ,
Security and privacy issues in epassports, Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp.74-88, 2005. ,
Introduction to optimal estimation, Advanced textbooks in control and signal processing, 1999. ,
Discriminant analysis, Quantitative applications in the social sciences, 1980. ,
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Proceedings of CRYPTO'96, pp.104-113, 1996. ,
DOI : 10.1007/3-540-68697-5_9
Encryption secured against DPA, 2008. ,
Differential Cluster Analysis, Cryptographic Hardware and Embedded Systems ? CHES 2009, pp.112-127, 2009. ,
DOI : 10.1007/978-3-642-04138-9_9
Higher order statistics for side channel analysis enhancement, in e-Smart, 2006. ,
Adaptive multiscale principal component analysis for on-line monitoring of a sequencing batch reactor, Journal of Biotechnology, vol.116, issue.2, pp.195-210, 2005. ,
DOI : 10.1016/j.jbiotec.2004.10.012
Power Variance Analysis Breaks a Masked ASIC Implementation of AES, in DATE'10, IEEE Computer Society, 2010. ,
Power Variance Analysis breaks a masked ASIC implementation of AES, in DATE, pp.1059-1064, 2010. ,
Advanced Research on Computer Education, Simulation and Modeling: International Conference, Proceedings, no. ptie. 2 in Communications in Computer and Information Science Series, 2011. ,
Differential Power Analysis enhancement with statistical preprocessing, 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010), 2010. ,
DOI : 10.1109/DATE.2010.5457007
Evaluation of Countermeasures Implementation Based on Boolean Masking to Thwart First and Second Order Side-Channel Attacks, SCS, IEEE, pp.1-6, 2009. ,
Complete version online ,
Evaluation of Countermeasures Implementation Based on Boolean Masking to Thwart First and Second Order Side-Channel Attacks, SCS, IEEE, pp.1-6, 2009. ,
Complete version online ,
Entropy-based Power Attack, in HOST, IEEE Computer Society, pp.1-6, 2010. ,
Hardware Countermeasures against DPA ??? A Statistical Analysis of Their Effectiveness, CT-RSA, pp.222-235, 2004. ,
DOI : 10.1007/978-3-540-24660-2_18
Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006. ,
One for All -All for One: Unifying Standard DPA Attacks, Cryptology ePrint Archive Report, vol.449449, 2009. ,
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations, CHES, pp.76-90, 2006. ,
DOI : 10.1007/11894063_7
Side channel analysis using giant magneto-resistive (gmr) sensors, in Cosade, 2011. ,
A new correlation frequency analysis of the side channel, Proceedings of the 5th Workshop on Embedded Systems Security, WESS '10, pp.1-4, 2010. ,
DOI : 10.1145/1873548.1873552
Side channel analysis using giant magnetoresistive ( gmr ) sensors, Design, 2011. ,
Examining smart-card security under the threat of power analysis attacks, IEEE Transactions on Computers, vol.51, issue.5, pp.51-541, 2002. ,
DOI : 10.1109/TC.2002.1004593
Using Second-Order Power Analysis to Attack DPA Resistant Software, Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems, CHES '00, pp.238-251, 2000. ,
DOI : 10.1007/3-540-44499-8_19
Investigations of Power Analysis Attacks on Smartcards, USENIX ? Smartcard'99, pp.151-162, 1999. ,
Mathematical methods and algorithms for signal processing, 2000. ,
Also http://eprint.iacr.org, 2009. ,
Why CIM-PACA?; www. arcsis. org/ uploads/ media ,
Functions of concomitants of order statistics, Journal of the Indian Society for Probability and Statistics, vol.7, pp.15-32, 2003. ,
BCDL: A high performance balanced DPL with global precharge and without earlyevaluation , in DATE'10, pp.849-854, 2010. ,
Wavelets made easy, 1999. ,
DOI : 10.1007/978-1-4612-0573-9
Data Encryption Standard. FIPS PUB 46-3 http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf, REFERENCES [105] , Advanced Encryption Standard (AES). FIPS PUB 197, 1999. ,
Mathematical Contributions to the Theory of Evolution. III. Regression, Heredity, and Panmixia, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol.187, issue.0, pp.253-318, 1896. ,
DOI : 10.1098/rsta.1896.0007
Power and electromagnetic analysis: Improved model, consequences and comparisons, Integration, The VLSI Journal, special issue on " Embedded Cryptographic Hardware, pp.52-60, 2007. ,
Improving the DPA attack using Wavelet transform, 2005. ,
Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints, Proceedings of CHES'05, pp.172-186, 2005. ,
DOI : 10.1007/11545262_13
Digital communications, McGraw-Hill higher education, 2008. ,
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis, LNCS, vol.5536, pp.499-518, 2009. ,
Compatibilit lectromagntique, Course note ofÉcoleof´ofÉcole Polytechnique Fdrale de Lausanne, 2006. ,
Applications of Fourier Transforms to Generalized Functions, 2011. ,
Practical Template Attacks, WISA, pp.443-457, 2004. ,
DOI : 10.1007/978-3-540-31815-6_35
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.6474
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers, CHES, pp.171-188, 2009. ,
DOI : 10.1007/978-3-642-04138-9_13
Multimodal image registration by maximization of the correlation ratio, 1998. ,
URL : https://hal.archives-ouvertes.fr/inria-00073311
Thirteen Ways to Look at the Correlation Coefficient, The American Statistician, pp.59-66, 1988. ,
Thirteen ways to look at the correlation coefficient, The American Statistician, pp.59-66, 1988. ,
Fundamentals of biostatistics, Cole Cengage Learning, 2010. ,
Statistics for the behavioural sciences: an introduction, 2003. ,
Public-key cryptography, Texts in theoretical computer science, 1996. ,
Data mining et statistique dcisionnelle. L'intelligence des donnes, 2010. ,
Side-channel Attack Standard Evaluation Board, SASEBO (Project of the AIST); SASEBO-G experimental board ? http ,
Electromagnetic Radiations of FPGAs, ACM Transactions on Reconfigurable Technology and Systems, vol.2, issue.1, pp.1-24, 2009. ,
DOI : 10.1145/1502781.1502785
URL : https://hal.archives-ouvertes.fr/hal-00319164
Masking and Dual-Rail Logic Don???t Add Up, CHES, pp.95-106, 2007. ,
DOI : 10.1007/978-3-540-74735-2_7
A Combined Timing and Power Attack, Public Key Cryptography, pp.263-279, 2002. ,
DOI : 10.1007/3-540-45664-3_19
A Stochastic Model for Differential Side Channel Cryptanalysis, LNCS, vol.3659, pp.30-46, 2005. ,
DOI : 10.1007/11545262_3
Efficiency analysis of data compression of power system transients using wavelet transform, 2003 IEEE Bologna Power Tech Conference Proceedings,, p.6, 2003. ,
DOI : 10.1109/PTC.2003.1304802
Linear Transformation, 2007. ,
A tutorial in Principal Component Analysis, 2005. ,
The use of discrete data in PCA for socioeconomic status evaluation, 2005. ,
Stochastic models, estimation, and control, 1979. ,
A tutorial in Principal Component Analysis, 2002. ,
Bayesian and MCMC methods in quantitative genetics, Statistics for biology and health, 2002. ,
Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, CHES. REFERENCES [143] F.-X. Standaert, P. Bulens, G. de Meulenaer, and N. Veyrat- Charvillon, Improving the Rules of the DPA Contest. Cryptology ePrint Archive, pp.411-425, 2008. ,
DOI : 10.1007/978-3-540-85053-3_26
Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices, ICISC, pp.253-267, 2008. ,
DOI : 10.1007/11802839_42
How to Compare Profiled Side-Channel Attacks?, LNCS, vol.5536, pp.485-498, 2009. ,
DOI : 10.1007/978-3-642-01957-9_30
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT, pp.443-461, 2009. ,
DOI : 10.1007/978-3-540-85053-3_26
Data mining et statistique dcisionnelle. L'intelligence des donnes, 2010. ,
Image Processing Toolbox: For Use with MAT- LAB;[user's Guide, 1995. ,
A new frequency-based side channel attack for embedded systems. master degree thesis, deparment of electrical and computer engineering,university of waterloo, 2005. ,
Wavelet image and video compression, Kluwer international series in engineering and computer science, Kluwer Academic, 1998. ,
Improving Differential Power Analysis by Elastic Alignment, CT-RSA, pp.104-119, 2011. ,
DOI : 10.1007/978-3-642-00730-9_16
Gini's mean difference: a superior measure of variability for nonnormal distributions, International Journal of Statistics, vol.2, pp.285-316, 2003. ,
Fundamentals of Kalman Filtering: A Practical Approach, 2006. ,
Multimedia security technologies for digital rights management, Electronics & Electrical, 2006. ,
PCA for data fusion and navigation of mobile robots, LNCS, vol.3495, pp.610-611, 2005. ,