Hall of fame
The results of the evaluation of the submissions will be published on this page.
Participants
This is a list of teams that have sent submissions to the third edition of the DPA contest.
Names | Affiliation | Logo |
---|---|---|
Shaohua Tang, Weijian Li, Houwen Zou, Yaolei Lv, Bin Li, Kai Sun | School of Computer Science and Engineering, South China University of Technology, China | |
Colin O'Flynn | Dalhousie University, CA | |
Stephane Fernandes Medeiros, Liran Lerman, Nikita Veshchikov | Université Libre de Bruxelles, Belgium | |
Kaoru Okamoto | Department of Communication Network Engineering, Faculty of Engineering, Okayama University | |
Ming Tang, Zhenlong Qiu, Pingpan Cheng, Li Zhao | Computer School of Wuhan University, China | |
Kim Yongdae | The Attached Institute of ETRI (Electronics and Telecommunications Research Institute), Korea | |
Daisuke Fujimoto | Kobe University, Japan | |
Emiri Kamagata | Keirex Technology Inc., Japan | |
Yuu Tsuchiya, Takeshi Kishikawa, Shohei Saito, Tsuyoshi Toyama, Akihiko Sasaki, Tsutomu Matsumoto | Yokohama National University, Japan |
Results
The results of the evaluation of submissions to the DPA contest v3 will be published here as and when they are available. So, for the moment, these results are not complete.
Participant | Affiliation | Date / Name | Description of the platform | CPA (from AIST) | CPA (from Télécom ParisTech) | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Min # trace to find correct key |
Min # trace to find correct key (stable) |
Min # trace max PGE < 3 |
Min # trace max PGE < 3 (stable) |
Min # trace to find correct key |
Min # trace to find correct key (stable) |
Min # trace max PGE < 3 |
Min # trace max PGE < 3 (stable) |
||||
Stephane Fernandes Medeiros, Liran Lerman, Nikita Veshchikov | Université Libre de Bruxelles, Belgium | 06/02/2012 | Description (PDF) | F | F | F | F | F | F | F | F |
Colin O'Flynn | Dalhousie University, CA | 27/02/2012 / capture 1 | Description (PDF) | F | F | F | F | F | F | F | F |
Colin O'Flynn | Dalhousie University, CA | 27/02/2012 / capture 1 window | Description (PDF) | 2,247 | 2,834 | 1,964 | 2,220 | 2,158 | 2,389 | 1,437 | 1,495 |
Colin O'Flynn | Dalhousie University, CA | 27/02/2012 / capture 2 | Description (PDF) | F | F | 3,704 | F | 3,704 | F | 3,337 | F |
Colin O'Flynn | Dalhousie University, CA | 27/02/2012 / capture 2 average | Description (PDF) | 2,940 | 2,940 | 2,220 | 2,875 | 2,336 | 2,583 | 1,685 | 2,220 |
Colin O'Flynn | Dalhousie University, CA | 27/02/2012 / capture 2 lowpasswindow | Description (PDF) | 2,500 | 2,571 | 2,065 | 2,479 | 2,100 | 2,461 | 1,450 | 1,709 |
Colin O'Flynn | Dalhousie University, CA | 27/02/2012 / capture 2 window | Description (PDF) | 2,635 | 2,647 | 1,961 | 2,256 | 2,635 | 2,647 | 1,932 | 2,065 |
Colin O'Flynn | Dalhousie University, CA | 27/02/2012 / capture 3 | Description (PDF) | 2,499 | F | 2,094 | 2,134 | 2,250 | F | 2,037 | 2,068 |
Shaohua Tang, Weijian Li, Houwen Zou, Yaolei Lv, Bin Li, Kai Sun | School of Computer Science and Engineering, South China University of Technology, China | 27/02/2012 | Description (PDF) | F | F | F | F | F | F | F | F |
Kaoru Okamoto | Department of Communication Network Engineering, Faculty of Engineering, Okayama University | 29/02/2012 | Description (PDF) | F | F | F | F | F | F | F | F |
Ming Tang, Zhenlong Qiu, Pingpan Cheng, Li Zhao | Computer School of Wuhan University, China | 12/06/2012 | Description (PDF) | F | F | F | F | F | F | F | F |
Colin O'Flynn | Dalhousie University, CA | 28/07/2012 | Description (PDF) | 3,056 | 3,056 | 2,891 | 2,891 | 2,873 | 2,873 | 1,983 | 2,838 |
Colin O'Flynn | Dalhousie University, CA | 28/07/2012 / windowed | Description (PDF) | 1,945 | 1,945 | 1,859 | 1,859 | 1,965 | 1,965 | 1,859 | 1,908 |
Emiri Kamagata | Keirex Technology Inc., Japan | 30/07/2012 | Description (PDF) | 3,691 | 3,691 | 3,557 | 3,618 | F | F | F | F |
Daisuke Fujimoto | Kobe University, Japan | 31/07/2012 | Description (PDF) | F | F | F | F | 2,357 | 3,210 | 2,068 | 2,373 |
Kim Yongdae | The Attached Institute of ETRI (Electronics and Telecommunications Research Institute), Korea | 31/07/2012 | Description (PDF) | 1,447 | 1,447 | 676 | 997 | F | F | F | F |
Yuu Tsuchiya, Takeshi Kishikawa, Shohei Saito, Tsuyoshi Toyama, Akihiko Sasaki, Tsutomu Matsumoto | Yokohama National University, Japan | 31/07/2012 | Description (PDF) | 796 | 800 | 640 | 762 | F | F | F | F |
Key
- Min # trace to find correct key: Minimum number of traces needed by the attack to find the correct key
- Min # trace to find correct key (stable): Minimum number of traces needed by the attack to find the correct key. The attack must also return the correct key during the processing of the next 100 traces (stability criteria)
- Min # trace max PGE (Partial Guessing Entropy) < 3: Minimum number of traces needed by the attack so that for each byte of the key, the correct value is ranked into the three most probable values
- Min # trace max PGE (Partial Guessing Entropy) < 3 (stable): Minimum number of traces needed by the attack so that for each byte of the key, the correct value is ranked into the three most probable values. This criteria must stay valid during the processing of the next 100 traces.