An overview of hardware-level statistical power analysis attack countermeasures

M Mayhew, R Muresan - Journal of Cryptographic Engineering, 2017 - Springer
While the cryptographic modules used in modern embedded systems may employ
mathematically secure algorithms, an attacker may still be able to compromise the security of …

Diffusional side-channel leakage from unrolled lightweight block ciphers: A case study of power analysis on PRINCE

V Yli-Mäyry, R Ueno, N Miura, M Nagata… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
This study investigates a new side-channel leakage observed in the inner rounds of an
unrolled hardware implementation of block ciphers in a chosen-input attack scenario. The …

Novel approach to protect advanced encryption standard algorithm implementation against differential electromagnetic and power analysis

M Masoumi, MH Rezayati - IEEE Transactions on Information …, 2014 - ieeexplore.ieee.org
This paper describes a novel approach for implementation of the advanced encryption
standard (AES) algorithm, which provides a significantly improved strength against first …

[HTML][HTML] Security and privacy challenges in cyber-physical systems

F AlDosari - Journal of Information Security, 2017 - scirp.org
Cyber-Physical Systems, or Smart-Embedded Systems, are co-engineered for the
integration of physical, computational and networking resources. These resources are used …

[图书][B] Exploitation of unintentional information leakage from integrated circuits

WE Cobb - 2011 - search.proquest.com
The information leakage of electronic devices, especially those used in cryptographic or
other vital applications, represents a serious practical threat to secure systems. While …

Vulnerability of advanced encryption standard algorithm to differential power analysis attacks implemented on ATmega-128 microcontroller

K Mpalane, N Gasela, BM Esiefarienrhe… - 2016 Third …, 2016 - ieeexplore.ieee.org
A wide variety of cryptographic embedded devices including smartcards, ASICs and FPGAs
must be secure against breaking in. However, these devices are vulnerable to side channel …

A low-overhead countermeasure against differential power analysis for aes block cipher

M Asfand Hafeez, M Mazyad Hazzazi, H Tariq… - Applied Sciences, 2021 - mdpi.com
This paper presents the employment of a DPA attack on the NIST (National Institute of
Standards and Technology) standardized AES (advance encryption standard) protocol for …

Deep learning-based side-channel analysis against aes inner rounds

S Swaminathan, Ł Chmielewski, G Perin… - … Conference on Applied …, 2022 - Springer
Side-channel attacks (SCA) focus on vulnerabilities caused by insecure implementations
and exploit them to deduce useful information about the data being processed or the data …

Protection against side channels

C Pepin, F Lecocq, V Servant - US Patent 9,515,820, 2016 - Google Patents
The description pertains in particular to a method of protecting an electronic device
(SCARD), when the electronic device implements a cryptographic algorithm (AES), against …

Side-Channel Attack of Lightweight Cryptography Based on MixColumn: Case Study of PRINCE

J Xue, X Jiang, P Li, W Xi, C Xu, K Huang - Electronics, 2023 - mdpi.com
Lightweight cryptography is implemented in unrolled architecture generally, which has the
characteristics of low latency and high real-time performance but also faces the threat of …