Universite Bordeaux 1
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this scenario, an adversary first uses a device under the author control in order to build a good leakage model. Then, the user takes advantage of this leakage model to exploit the actual leakages of a similar target device and perform a key recovery. Since such attacks are divided in two phases (namely pro ling and online attack), the question of how to best evaluate those two phases arises. In this paper, the authors take advantage of a recently introduced framework for the analysis of side-channel attacks to tackle this issue.