Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations

Algebraic side-channel attack (ASCA) is a typical technique that relies on a general solver to solve the equations of a cipher and its side-channel leaks. It falls under analytical side-channel attack and can recover the entire key at once. Many ASCAs are proposed against the AES, and they utilize t...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IEEE transactions on information forensics and security Ročník 9; číslo 6; s. 999 - 1014
Hlavní autoři: Shize Guo, Xinjie Zhao, Fan Zhang, Tao Wang, Shi, Zhijie Jerry, Standaert, Francois-Xavier, Chujiao Ma
Médium: Journal Article
Jazyk:angličtina
Vydáno: New York, NY IEEE 01.06.2014
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Témata:
ISSN:1556-6013, 1556-6021
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Algebraic side-channel attack (ASCA) is a typical technique that relies on a general solver to solve the equations of a cipher and its side-channel leaks. It falls under analytical side-channel attack and can recover the entire key at once. Many ASCAs are proposed against the AES, and they utilize the Gröbner basis-based, SAT-based, or optimizer-based solver. The advantage of the general solver approach is its generic feature, which can be easily applied to different cryptographic algorithms. The disadvantage is that it is difficult to take into account the specialized properties of the targeted cryptographic algorithms. The results vary depending on what type of solver is used, and the time complexity is quite high when considering the error-tolerant attack scenarios. Thus, we were motivated to find a new approach that would lessen the influence of the general solver and reduce the time complexity of ASCA. This paper proposes a new analytical side-channel attack on AES by exploiting the incomplete diffusion feature in one AES round. We named our technique incomplete diffusion analytical side-channel analysis (IDASCA). Different from previous ASCAs, IDASCA adopts a specialized approach to recover the secret key of AES instead of the general solver. Extensive attacks are performed against the software implementation of AES on an 8-bit microcontroller. Experimental results show that: 1) IDASCA can exploit the side-channel leaks in all AES rounds using a single power trace; 2) it has less time complexity and more robustness than previous ASCAs, especially when considering the error-tolerant attack scenarios; and 3) it can calculate the reduced key search space of AES for the given amount of side-channel leaks. IDASCA can also interpret the mechanism behind previous ASCAs on AES from a quantitative perspective, such as why ASCA can work under unknown plaintext/ciphertext scenarios and what are the extreme cases in ASCAs.
AbstractList Algebraic side-channel attack (ASCA) is a typical technique that relies on a general solver to solve the equations of a cipher and its side-channel leaks. It falls under analytical side-channel attack and can recover the entire key at once. Many ASCAs are proposed against the AES, and they utilize the Gröbner basis-based, SAT-based, or optimizer-based solver. The advantage of the general solver approach is its generic feature, which can be easily applied to different cryptographic algorithms. The disadvantage is that it is difficult to take into account the specialized properties of the targeted cryptographic algorithms. The results vary depending on what type of solver is used, and the time complexity is quite high when considering the error-tolerant attack scenarios. Thus, we were motivated to find a new approach that would lessen the influence of the general solver and reduce the time complexity of ASCA. This paper proposes a new analytical side-channel attack on AES by exploiting the incomplete diffusion feature in one AES round. We named our technique incomplete diffusion analytical side-channel analysis (IDASCA). Different from previous ASCAs, IDASCA adopts a specialized approach to recover the secret key of AES instead of the general solver. Extensive attacks are performed against the software implementation of AES on an 8-bit microcontroller. Experimental results show that: 1) IDASCA can exploit the side-channel leaks in all AES rounds using a single power trace; 2) it has less time complexity and more robustness than previous ASCAs, especially when considering the error-tolerant attack scenarios; and 3) it can calculate the reduced key search space of AES for the given amount of side-channel leaks. IDASCA can also interpret the mechanism behind previous ASCAs on AES from a quantitative perspective, such as why ASCA can work under unknown plaintext/ciphertext scenarios and what are the extreme cases in ASCAs.
Algebraic side-channel attack (ASCA) is a typical technique that relies on a general solver to solve the equations of a cipher and its side-channel leaks. It falls under analytical side-channel attack and can recover the entire key at once. Many ASCAs are proposed against the AES, and they utilize the Gröbner basis-based, SAT-based, or optimizer-based solver. The advantage of the general solver approach is its generic feature, which can be easily applied to different cryptographic algorithms. The disadvantage is that it is difficult to take into account the specialized properties of the targeted cryptographic algorithms. The results vary depending on what type of solver is used, and the time complexity is quite high when considering the error-tolerant attack scenarios. Thus, we were motivated to find a new approach that would lessen the influence of the general solver and reduce the time complexity of ASCA. This paper proposes a new analytical side-channel attack on AES by exploiting the incomplete diffusion feature in one AES round. We named our technique incomplete diffusion analytical side-channel analysis (IDASCA). Different from previous ASCAs, IDASCA adopts a specialized approach to recover the secret key of AES instead of the general solver. Extensive attacks are performed against the software implementation of AES on an 8-bit microcontroller. Experimental results show that: 1) IDASCA can exploit the side-channel leaks in all AES rounds using a single power trace; 2) it has less time complexity and more robustness than previous ASCAs, especially when considering the error-tolerant attack scenarios; and 3) it can calculate the reduced key search space of AES for the given amount of side-channel leaks. IDASCA can also interpret the mechanism behind previous ASCAs on AES from a quantitative perspective, such as why ASCA can work under unknown plaintext/ciphertext scenarios and what are the extreme cases in ASCAs.
Algebraic side-channel attack (ASCA) is a typical technique that relies on a general solver to solve the equations of a cipher and its side-channel leaks. It falls under analytical side-channel attack and can recover the entire key at once. Many ASCAs are proposed against the AES, and they utilize the Grobner basis-based, SAT-based, or optimizer-based solver. The advantage of the general solver approach is its generic feature, which can be easily applied to different cryptographic algorithms. The disadvantage is that it is difficult to take into account the specialized properties of the targeted cryptographic algorithms. The results vary depending on what type of solver is used, and the time complexity is quite high when considering the error-tolerant attack scenarios. Thus, we were motivated to find a new approach that would lessen the influence of the general solver and reduce the time complexity of ASCA. This paper proposes a new analytical side-channel attack on AES by exploiting the incomplete diffusion feature in one AES round. We named our technique incomplete diffusion analytical side-channel analysis (IDASCA). Different from previous ASCAs, IDASCA adopts a specialized approach to recover the secret key of AES instead of the general solver. Extensive attacks are performed against the software implementation of AES on an 8-bit microcontroller. Experimental results show that: 1) IDASCA can exploit the side-channel leaks in all AES rounds using a single power trace; 2) it has less time complexity and more robustness than previous ASCAs, especially when considering the error-tolerant attack scenarios; and 3) it can calculate the reduced key search space of AES for the given amount of side-channel leaks. IDASCA can also interpret the mechanism behind previous ASCAs on AES from a quantitative perspective, such as why ASCA can work under unknown plaintext/ciphertext scenarios and what are the extreme cases in ASCAs.
Author Shi, Zhijie Jerry
Tao Wang
Standaert, Francois-Xavier
Xinjie Zhao
Shize Guo
Fan Zhang
Chujiao Ma
Author_xml – sequence: 1
  surname: Shize Guo
  fullname: Shize Guo
  email: tigerone-gsz@vip.sina.com
  organization: Inst. of North Electron. Equip., Beijing, China
– sequence: 2
  surname: Xinjie Zhao
  fullname: Xinjie Zhao
  email: zhaoxinjieem@163.com
  organization: Inst. of North Electron. Equip., Beijing, China
– sequence: 3
  surname: Fan Zhang
  fullname: Fan Zhang
  email: fanzhang@zju.edu.cn
  organization: Dept. of Inf. Sci. & Electr. Eng., Zhejiang Univ., Hangzhou, China
– sequence: 4
  surname: Tao Wang
  fullname: Tao Wang
  email: twangdrsjz@yahoo.com.cn
  organization: Dept. of Inf. Eng., Ordnance Eng. Coll., Shijiazhuang, China
– sequence: 5
  givenname: Zhijie Jerry
  surname: Shi
  fullname: Shi, Zhijie Jerry
  email: shi@engr.uconn.edu
  organization: Dept. of Comput. Sci. & Eng., Univ. of Connecticut, Storrs, CT, USA
– sequence: 6
  givenname: Francois-Xavier
  surname: Standaert
  fullname: Standaert, Francois-Xavier
  email: fstandae@uclouvain.be
  organization: UCL Crypto Group, Louvain-la-Neuve, Belgium
– sequence: 7
  surname: Chujiao Ma
  fullname: Chujiao Ma
  email: hujiao.ma@engr.uconn.edu
  organization: Dept. of Comput. Sci. & Eng., Univ. of Connecticut, Storrs, CT, USA
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=28538558$$DView record in Pascal Francis
BookMark eNp9kcFu1DAURSNUJNrCByA2lhASmxliJ3ZidtEwA5GKWExZW4790rp47GA7EuVr-FScztBFF2z8vDj3Pr17L4oz5x0UxWtcrjEu-YfrfrdfkxLXa1JhSqv6WXGeJ1uxkuCzxz-uXhQXMd6VZV1j1p4Xf7a_JutNMu4GpVtAvVP-MFlIgD6ZcZyj8Q7tQKY5wEfUof0EykhrfoNGnZP2PhklLdobDavNrXQOLOpSkuoH6m6kcTE92HbbPZJOoz5F1E2TzaK0OCePvhoVvPIuBW8tBNQv6w_g0gMRXxbPR2kjvDrNy-L7bnu9-bK6-va533RXK1VxnlZcMllpIKBZqzjnJW9q2SjKFDCGCVMMKq3xoPXQtAPFTaYGygeNydASWVaXxfuj7xT8zxliEgcTFVgrHfg5CsxIDo3kJ6Nvn6B3fg45jEzRmnLKeMUy9e5EyZgjGoN0ykQxBXOQ4V6QllYtpW3mmiOXY4gxwCiUOd6egjRW4FIsDYulYbE0LE4NZyV-ovxn_j_Nm6PGAMAjz5qWMMqrv8PYtSI
CODEN ITIFA6
CitedBy_id crossref_primary_10_1007_s11071_020_06098_0
crossref_primary_10_1007_s11071_024_09907_y
crossref_primary_10_1109_ACCESS_2020_2973679
crossref_primary_10_1007_s11071_023_09125_y
crossref_primary_10_1016_j_patter_2025_101288
crossref_primary_10_1007_s11277_022_09933_2
crossref_primary_10_1109_JIOT_2023_3314058
crossref_primary_10_1038_s41598_023_28002_7
Cites_doi 10.1007/978-3-642-38348-9_8
10.1007/s13389-012-0028-0
10.1016/S0022-4049(99)00005-5
10.1007/978-3-642-35999-6_25
10.1007/s12532-008-0001-1
10.1007/978-0-387-88757-9
10.1007/978-3-642-29912-4_17
10.1109/HST.2012.6224335
10.1007/978-3-642-16342-5_29
10.1007/3-540-45418-7_17
10.1007/3-540-48285-7_33
10.1007/3-540-38424-3_1
10.1016/j.jss.2012.11.007
10.1007/978-3-642-22792-9_10
ContentType Journal Article
Copyright 2015 INIST-CNRS
Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2014
Copyright_xml – notice: 2015 INIST-CNRS
– notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2014
DBID 97E
RIA
RIE
AAYXX
CITATION
IQODW
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
F28
DOI 10.1109/TIFS.2014.2315534
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998-Present
IEEE Electronic Library (IEL)
CrossRef
Pascal-Francis
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Civil Engineering Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
DatabaseTitle CrossRef
Civil Engineering Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList
Civil Engineering Abstracts
Civil Engineering Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
Mathematics
Applied Sciences
EISSN 1556-6021
EndPage 1014
ExternalDocumentID 3377531001
28538558
10_1109_TIFS_2014_2315534
6782659
Genre orig-research
GrantInformation_xml – fundername: ERC
– fundername: Major State Basic Research Development Program (973 Plan) of China
  grantid: 2013CB338004
– fundername: U.S. National Science Foundation
  grantid: CNS-0644188
– fundername: National Natural Science Foundation of China
  grantid: 60772082; 61173191; 61272491; 61202386; 61309021
  funderid: 10.13039/501100001809
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
IQODW
RIG
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
F28
ID FETCH-LOGICAL-c399t-9a6a3de2ed68c9990974a7c56ce66126c6e3dd1bddb78b5178c9b59bd12b82a03
IEDL.DBID RIE
ISICitedReferencesCount 21
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000336798100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1556-6013
IngestDate Wed Oct 01 13:55:54 EDT 2025
Sun Nov 09 06:16:43 EST 2025
Wed Apr 02 07:46:47 EDT 2025
Sat Nov 29 03:49:35 EST 2025
Tue Nov 18 22:35:39 EST 2025
Tue Aug 26 16:49:25 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords Hamming weight leakage model
Incomplete diffusion
algebraic side-channel attack
AES
microcontrollers
Algebraic attack
Constraint satisfaction
Modeling
Physical attacks
Fault tolerance
AES algorithm
Robustness
Safety
Cryptography
Computer attack
Side channel attack
Gröbner basis
Microcontroller
Search key
Leak
Boolean function
Experimental result
Weight function
Cryptanalysis
Secret key
Occupation time
Time complexity
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
CC BY 4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c399t-9a6a3de2ed68c9990974a7c56ce66126c6e3dd1bddb78b5178c9b59bd12b82a03
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
OpenAccessLink http://hdl.handle.net/2078.1/152911
PQID 1545956936
PQPubID 85506
PageCount 16
ParticipantIDs pascalfrancis_primary_28538558
crossref_citationtrail_10_1109_TIFS_2014_2315534
proquest_journals_1545956936
ieee_primary_6782659
proquest_miscellaneous_1620042200
crossref_primary_10_1109_TIFS_2014_2315534
PublicationCentury 2000
PublicationDate 2014-06-01
PublicationDateYYYYMMDD 2014-06-01
PublicationDate_xml – month: 06
  year: 2014
  text: 2014-06-01
  day: 01
PublicationDecade 2010
PublicationPlace New York, NY
PublicationPlace_xml – name: New York, NY
– name: New York
PublicationTitle IEEE transactions on information forensics and security
PublicationTitleAbbrev TIFS
PublicationYear 2014
Publisher IEEE
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: Institute of Electrical and Electronics Engineers
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref35
renauld (ref28) 0
oren (ref22) 2012
ref34
ref37
ref36
ref14
dinur (ref13) 2009
schindler (ref31) 2005; 3659
ref1
renauld (ref29) 2011; 6632
ref19
daemen (ref12) 1998
schramm (ref30) 2004; 3156
akdemir (ref2) 2010
kocher (ref17) 1999; 1666
mangard (ref18) 0; 2587
standaert (ref32) 2009; 5479
cid (ref10) 2006
quisquater (ref25) 2001; 2140
(ref24) 2004
kocher (ref16) 1996; 1109
ref26
renauld (ref27) 2009; 5747
brier (ref7) 2004; 3156
ref20
oren (ref21) 2010; 6225
gierlichs (ref15) 2008; 5154
soos (ref33) 2009; 5584
ref8
chari (ref9) 2002; 2523
bogdanov (ref5) 2007
ref4
ref3
ref6
courtois (ref11) 2002; 2501
oren (ref23) 2012; 7428
References_xml – volume: 6225
  start-page: 428
  year: 2010
  ident: ref21
  article-title: Algebraic side-channel analysis in the presence of errors
  publication-title: Cryptographic Hardware and Embedded Systems
– ident: ref35
  doi: 10.1007/978-3-642-38348-9_8
– volume: 3156
  start-page: 163
  year: 2004
  ident: ref30
  article-title: A collision-attack on AES
  publication-title: Cryptographic Hardware and Embedded Systems
– year: 2010
  ident: ref2
  publication-title: Breakthrough AES Performance with Intel AES New Instructions
– volume: 3156
  start-page: 16
  year: 2004
  ident: ref7
  article-title: Correlation power analysis with a leakage model
  publication-title: Cryptographic Hardware and Embedded Systems
– volume: 5154
  start-page: 426
  year: 2008
  ident: ref15
  article-title: Mutual information analysis
  publication-title: Cryptographic Hardware and Embedded Systems
– ident: ref8
  doi: 10.1007/s13389-012-0028-0
– year: 0
  ident: ref28
  article-title: Representation-, leakageand cipher-dependencies in algebraic side-channel attacks
  publication-title: Proc of the International Conference on Applied Cryptography and Network Security
– volume: 7428
  start-page: 140
  year: 2012
  ident: ref23
  article-title: Algebraic side-channel attacks beyond the hamming weight leakage model
  publication-title: Cryptographic Hardware and Embedded Systems
– ident: ref14
  doi: 10.1016/S0022-4049(99)00005-5
– volume: 2587
  start-page: 343
  year: 0
  ident: ref18
  article-title: A simple power-analysis (SPA) attack on implementations of the AES key expansion
  publication-title: Proc 5th ICISC
– volume: 2501
  start-page: 267
  year: 2002
  ident: ref11
  article-title: Cryptanalysis of block ciphers with overdefined systems of equations
  publication-title: ASIACRYPT
– ident: ref34
  doi: 10.1007/978-3-642-35999-6_25
– ident: ref1
  doi: 10.1007/s12532-008-0001-1
– ident: ref3
  doi: 10.1007/978-0-387-88757-9
– ident: ref36
  doi: 10.1007/978-3-642-29912-4_17
– year: 2012
  ident: ref22
  article-title: Tolerant algebraic side-channel analysis of AES
  publication-title: Cryptology
– year: 2009
  ident: ref13
  article-title: Side channel cube attacks on block ciphers
  publication-title: Cryptology
– ident: ref20
  doi: 10.1109/HST.2012.6224335
– year: 2004
  ident: ref24
  publication-title: zChaff
– volume: 5584
  start-page: 244
  year: 2009
  ident: ref33
  article-title: Extending SAT solvers to cryptographic problems
  publication-title: Theory and Applications of Satisfiability Testing
– volume: 1109
  start-page: 104
  year: 1996
  ident: ref16
  article-title: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
  publication-title: Advances in Cryptology
– year: 2007
  ident: ref5
  article-title: Algebraic side-channel collision attacks on AES
  publication-title: Cryptology
– ident: ref26
  doi: 10.1007/978-3-642-16342-5_29
– volume: 5747
  start-page: 97
  year: 2009
  ident: ref27
  article-title: Algebraic side-channel attacks on the AES: Why time also matters in DPA
  publication-title: Cryptographic Hardware and Embedded Systems
– volume: 2140
  start-page: 200
  year: 2001
  ident: ref25
  article-title: Electromagnetic analysis (EMA): Measures and counter-measures for smart cards
  publication-title: Smart Card Programming and Security
  doi: 10.1007/3-540-45418-7_17
– ident: ref19
  doi: 10.1007/3-540-48285-7_33
– year: 1998
  ident: ref12
  publication-title: AES proposal Rijndael
– volume: 5479
  start-page: 443
  year: 2009
  ident: ref32
  article-title: A unified framework for the analysis of side-channel key recovery attacks
  publication-title: Advances in Cryptology
– year: 2006
  ident: ref10
  publication-title: Algebraic Aspects of the Advanced Encryption Standard
– volume: 2523
  start-page: 13
  year: 2002
  ident: ref9
  article-title: Template attacks
  publication-title: Cryptographic Hardware and Embedded Systems
– volume: 3659
  start-page: 30
  year: 2005
  ident: ref31
  article-title: A stochastic model for differential side channel cryptanalysis
  publication-title: Cryptographic Hardware and Embedded Systems
– ident: ref4
  doi: 10.1007/3-540-38424-3_1
– ident: ref37
  doi: 10.1016/j.jss.2012.11.007
– ident: ref6
  doi: 10.1007/978-3-642-22792-9_10
– volume: 1666
  start-page: 388
  year: 1999
  ident: ref17
  article-title: Differential power analysis
  publication-title: Advances in Cryptology
– volume: 6632
  start-page: 109
  year: 2011
  ident: ref29
  article-title: A formal study of power variability issues and side-channel attacks for nanoscale devices
  publication-title: Advances in Cryptology
SSID ssj0044168
Score 2.212967
Snippet Algebraic side-channel attack (ASCA) is a typical technique that relies on a general solver to solve the equations of a cipher and its side-channel leaks. It...
SourceID proquest
pascalfrancis
crossref
ieee
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 999
SubjectTerms Algebra
Algorithmics. Computability. Computer arithmetics
Algorithms
Applied sciences
Ciphers
Complexity
Computer science; control theory; systems
Cryptography
Diffusion
Electronic mail
Equations
Exact sciences and technology
Field theory and polynomials
Information, signal and communications theory
Leaks
Mathematical analysis
Mathematical model
Mathematics
Memory and file management (including protection and security)
Memory organisation. Data processing
Microcontrollers
Sciences and techniques of general use
Signal and communications theory
Software
Solvers
Telecommunications and information theory
Theoretical computing
Title Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations
URI https://ieeexplore.ieee.org/document/6782659
https://www.proquest.com/docview/1545956936
https://www.proquest.com/docview/1620042200
Volume 9
WOSCitedRecordID wos000336798100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1556-6021
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0044168
  issn: 1556-6013
  databaseCode: RIE
  dateStart: 20060101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Nb9QwEB21FQc4UGhBBEplJE6ItE4cO0lvUdsVPVAhbZF6i_wVFLVk0SbhwK_hpzJ2vIGKColbIjvJKGOP39hvZgDeNtSl9VIiTnH9iDNFy1glHJ0VxmlqsoxplfliE_nlZXF9XX7agvdzLIy11pPP7JG79Gf5ZqVHt1V2jIY1Fbzchu08F1Os1sbq4qo-hb1xLmJ0Mlg4wUxoeXx1sVg6Eld2hGCGc5bdWYN8URVHiZQ9_pVmKmfxl2X2y81i9_8EfQKPA6wk1TQOnsKW7fZgd1OygYQZvAeP_sg_uA8_PQOvdcxngkCQoLFwDHPE0eSsbZrR7aQRBxLHtT0hFQnF6tsf1hCfzcRvhJNla2zswhQ6iyIMg9Q3pPoiW0Se_rXV-ZLIzpCLoSfV7wNzMqzIR8cHDHT5WxTUJyv-GuKhuv4ZfF6cX51-iEPJhlgj0hniUgrJjE2tEYVG7EnRXZG55kJbBAKp0MIyYxJljMoLxZMceyleKpOkqkglZc9hp1t19gWQvGhkojSTTGZZQxXi6xzBWqOUVSXeREA3Sqx1yGfuymrc1t6voWXt9F47vddB7xG8mx_5NiXz-FfnfafYuWPQaQSHd0bK3J4i8Ck4LyI42AydOtiDvnZAFT3RkokI3szNOJPd8Yzs7GrEPiL1GdkofXn_p1_BQyfgRFQ7gJ1hPdrX8EB_H9p-feinwy9_kQno
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lb9QwEB6VggQcKLQgAqUYiRMirePEeXCLoKuuaFdIu0i9RX4FRZQs2iQc-DX8VMaON1CBkLglspOMMvb4G_ubGYCXNbVpvWQaMlw_wkTSIpQRR2cl5pTpJImVTFyxiWyxyC8viw878HqKhTHGOPKZObaX7ixfr9Vgt8pO0LCylBc34CZPEkbHaK2t3cV1fQx84zwN0c2I_RlmRIuT1Xy2tDSu5BjhDOdxcm0VcmVVLClSdPhf6rGgxR-22S04s73_E_U-3PPAkpTjSHgAO6bdh71t0Qbi5_A-3P0tA-EB_HAcvMZynwlCQYLmwnLMEUmTd01dD3YvjViYOGzMG1ISX66--W40cflM3FY4WTbahDZQoTUoQt8L9ZmUn0SD2NO9tjxdEtFqMu87Uv46Mif9mlxYRqAnzF-hoC5d8RcfEdV2D-Hj7HT19iz0RRtChVinDwuRilgbZnSaK0SfFB0WkSmeKoNQgKUqNbHWkdRaZrnkUYa9JC-kjpjMmaDxI9ht1615DCTLaxFJFYtYJElNJSLsDOFaLaWRBd4EQLdKrJTPaG4La1xVzrOhRWX1Xlm9V17vAbyaHvk6pvP4V-cDq9ipo9dpAEfXRsrUzhD65JznARxuh07lLUJXWaiKvmgRpwG8mJpxLtsDGtGa9YB9UuZyslH65O-ffg63z1YX59X5fPH-Kdyxwo60tUPY7TeDeQa31Le-6TZHbmr8BGtKDS8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Exploiting+the+Incomplete+Diffusion+Feature%3A+A+Specialized+Analytical+Side-Channel+Attack+Against+the+AES+and+Its+Application+to+Microcontroller+Implementations&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Shize+Guo&rft.au=Xinjie+Zhao&rft.au=Fan+Zhang&rft.au=Tao+Wang&rft.date=2014-06-01&rft.pub=IEEE&rft.issn=1556-6013&rft.volume=9&rft.issue=6&rft.spage=999&rft.epage=1014&rft_id=info:doi/10.1109%2FTIFS.2014.2315534&rft.externalDocID=6782659
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon