Information theory and an extension of the Maximum Likelihood Principle, Second International Symposium on Information Theory, 1973. ,
Generalized Correlation Power Analysis, ECRYPT Workshop on Tools For Cryptanalysis, 2007. ,
Exponentially Decreasing Distributions for the Logarithm of Particle Size, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol.353, issue.1674, pp.401-419, 1977. ,
DOI : 10.1098/rspa.1977.0041
Differential Cluster Analysis, Cryptographic Hardware and Embedded Systems, pp.112-127, 2009. ,
DOI : 10.1007/978-3-642-04138-9_9
Mutual Information Analysis: a??Comprehensive Study, Journal of Cryptology, vol.4, issue.3, pp.269-291, 2011. ,
DOI : 10.1007/s00145-010-9084-8
Time-Frequency Analysis for Second-Order Attacks, CARDIS, 2013. ,
Ways to Enhance Differential Power Analysis, Information Security and Cryptology (ICISC), pp.327-342, 2002. ,
DOI : 10.1007/3-540-36552-4_23
Theory of Masking with Codewords in Hardware: Low-Weight dth-order Correlation-Immune Boolean Functions, IACR Cryptology ePrint Archive, p.303, 2013. ,
Side-channel leakage and trace compression using normalized inter-class variance, Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy, HASP '14, pp.1-7, 2014. ,
DOI : 10.1145/2611765.2611772
Higher-Order Threshold Implementations, ASIACRYPT 2014, pp.326-343, 2014. ,
DOI : 10.1007/978-3-662-45608-8_18
Correlation Power Analysis with a Leakage Model, Cryptographic Hardware and Embedded Systems, pp.16-29, 2004. ,
DOI : 10.1007/978-3-540-28632-5_2
On Adaptive Bandwidth Selection for Efficient MIA, In COSADE, 2014. ,
DOI : 10.1007/978-3-319-10175-0_7
URL : https://hal.archives-ouvertes.fr/lirmm-01096033
Side Channel Cryptanalysis of a Higher Order Masking Scheme, Cryptographic Hardware and Embedded Systems, pp.28-44, 2007. ,
DOI : 10.1007/978-3-540-74735-2_3
Univariate side channel attacks and leakage modeling, Journal of Cryptographic Engineering, vol.34, issue.9, pp.123-144, 2011. ,
DOI : 10.1007/s13389-011-0010-2
On the histogram as a density estimator:L2 theory. Probability Theory and Related Fields, pp.453-476, 1981. ,
Mutual Information Analysis, Cryptographic Hardware and Embedded Systems, pp.426-442, 2008. ,
DOI : 10.1007/978-3-540-85053-3_27
Differential Power Analysis, Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, volume 1666 of CRYPTO '99, pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
Mutual Information Analysis under the View of Higher-Order Statistics, IWSEC, pp.285-300, 2010. ,
DOI : 10.1007/978-3-642-16825-3_19
Maximal Information Coefficient Analysis, Cryptology ePrint Archive, 2014. ,
Behind the Scene of Side Channel Attacks, ASIACRYPT, volume Kazue Sako and Palash Sarkar of LNCS, pp.506-525, 2013. ,
DOI : 10.1007/978-3-642-42033-7_26
Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006. ,
Power Analysis Attacks and Countermeasures for Cryptographic Algorithms, 2000. ,
Investigations of Power Analysis Attacks on Smartcards, USENIX Workshop on Smartcard Technology, pp.151-162, 1999. ,
Detecting Hidden Leakages, ACNS, pp.324-342, 2014. ,
DOI : 10.1007/978-3-319-07536-5_20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.431.2366
Pushing the Limits: A Very Compact and a Threshold Implementation of AES, Lecture Notes in Computer Science, vol.6632, pp.69-88, 2011. ,
DOI : 10.1007/978-3-642-20465-4_6
Assessment of Hiding the Higher- Order Leakages in Hardware -What Are the Achievements Versus Overheads?, Cryptographic Hardware and Embedded Systems, pp.453-474, 2015. ,
RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp.1173-1178, 2012. ,
DOI : 10.1109/DATE.2012.6176671
URL : https://hal.archives-ouvertes.fr/hal-00666337
Improving Side-Channel Analysis with Optimal Linear Transforms, Proceedings of the 11th International Conference on Smart Card Research and Advanced Applications, CARDIS'12, pp.219-233, 2013. ,
DOI : 10.1007/978-3-642-37288-9_15
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure -Extended Version -. IACR Cryptology ePrint Archive, p.385, 2010. ,
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis, ACNS 2009, pp.499-518, 2009. ,
Theoretical and practical aspects of mutual information-based side channel analysis, International Journal of Applied Cryptography, vol.2, issue.2, pp.121-138, 2010. ,
DOI : 10.1504/IJACT.2010.038306
Generic DPA attacks: curse or blessing? In Lecture Notes in Computer Science, 2014. ,
A Stochastic Model for Differential Side Channel Cryptanalysis, Cryptographic Hardware and Embedded Systems, pp.30-46, 2005. ,
DOI : 10.1007/11545262_3
Leakage Assessment Methodology -A Clear Roadmap for Side-Channel Evaluations, Cryptographic Hardware and Embedded Systems, pp.495-513, 2015. ,
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order, IACR Cryptology ePrint Archive, vol.58, issue.6, p.571, 2015. ,
DOI : 10.1007/978-3-319-43283-0_12
Higher Order Masking of the AES, Lecture Notes in Computer Science, vol.3860, 2006. ,
DOI : 10.1007/11605805_14
On optimal and data-based histograms, Biometrika, pp.605-610, 1979. ,
DOI : 10.1093/biomet/66.3.605
Multivariate Density Estimation: Theory, Practice and Visualization, 1992. ,
DOI : 10.1002/9781118575574
Density Estimation for Statistics and Data Analysis, p.48, 1998. ,
DOI : 10.1007/978-1-4899-3324-9
Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices, Information Security and Cryptology, pp.253-267, 2008. ,
DOI : 10.1007/11802839_42
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Proceedings of the 28th Annual International Conference on Advances in Cryptology: The Theory and Applications of Cryptographic Techniques, EU- ROCRYPT '09, pp.443-461, 2009. ,
DOI : 10.1007/978-3-540-85053-3_26
Mutual Information Analysis: How, When and Why, Cryptographic Hardware and Embedded Systems, pp.429-443, 2009. ,
A model of the leakage in the frequency domain and its application to CPA and DPA, Journal of Cryptographic Engineering, vol.51, issue.5, pp.197-212, 2014. ,
DOI : 10.1007/s13389-014-0074-x
URL : https://hal.archives-ouvertes.fr/lirmm-01096000
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines, WISTP, pp.17-30, 2010. ,
DOI : 10.1103/PhysRevE.69.066138
URL : https://hal.archives-ouvertes.fr/hal-01056070
Generic sidechannel distinguishers: Improvements and limitations, CRYPTO 2011, pp.354-372 ,
DOI : 10.1007/978-3-642-22792-9_20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.5137
A fair evaluation framework for comparing side-channel distinguishers, Journal of Cryptographic Engineering, vol.7, issue.2, pp.145-160, 2011. ,
DOI : 10.1007/s13389-011-0011-1
The Myth of Generic DPA???and the Magic of Learning, CT-RSA, pp.183-205, 2014. ,
DOI : 10.1007/978-3-319-04852-9_10
On the Vulnerability of Low Entropy Masking Schemes, CARDIS, pp.44-60, 2013. ,