An overview of hardware-level statistical power analysis attack countermeasures
M Mayhew, R Muresan - Journal of Cryptographic Engineering, 2017 - Springer
While the cryptographic modules used in modern embedded systems may employ
mathematically secure algorithms, an attacker may still be able to compromise the security of …
mathematically secure algorithms, an attacker may still be able to compromise the security of …
Diffusional side-channel leakage from unrolled lightweight block ciphers: A case study of power analysis on PRINCE
This study investigates a new side-channel leakage observed in the inner rounds of an
unrolled hardware implementation of block ciphers in a chosen-input attack scenario. The …
unrolled hardware implementation of block ciphers in a chosen-input attack scenario. The …
Novel approach to protect advanced encryption standard algorithm implementation against differential electromagnetic and power analysis
M Masoumi, MH Rezayati - IEEE Transactions on Information …, 2014 - ieeexplore.ieee.org
This paper describes a novel approach for implementation of the advanced encryption
standard (AES) algorithm, which provides a significantly improved strength against first …
standard (AES) algorithm, which provides a significantly improved strength against first …
[HTML][HTML] Security and privacy challenges in cyber-physical systems
F AlDosari - Journal of Information Security, 2017 - scirp.org
Cyber-Physical Systems, or Smart-Embedded Systems, are co-engineered for the
integration of physical, computational and networking resources. These resources are used …
integration of physical, computational and networking resources. These resources are used …
[图书][B] Exploitation of unintentional information leakage from integrated circuits
WE Cobb - 2011 - search.proquest.com
The information leakage of electronic devices, especially those used in cryptographic or
other vital applications, represents a serious practical threat to secure systems. While …
other vital applications, represents a serious practical threat to secure systems. While …
Vulnerability of advanced encryption standard algorithm to differential power analysis attacks implemented on ATmega-128 microcontroller
K Mpalane, N Gasela, BM Esiefarienrhe… - 2016 Third …, 2016 - ieeexplore.ieee.org
A wide variety of cryptographic embedded devices including smartcards, ASICs and FPGAs
must be secure against breaking in. However, these devices are vulnerable to side channel …
must be secure against breaking in. However, these devices are vulnerable to side channel …
A low-overhead countermeasure against differential power analysis for aes block cipher
This paper presents the employment of a DPA attack on the NIST (National Institute of
Standards and Technology) standardized AES (advance encryption standard) protocol for …
Standards and Technology) standardized AES (advance encryption standard) protocol for …
Deep learning-based side-channel analysis against aes inner rounds
S Swaminathan, Ł Chmielewski, G Perin… - … Conference on Applied …, 2022 - Springer
Side-channel attacks (SCA) focus on vulnerabilities caused by insecure implementations
and exploit them to deduce useful information about the data being processed or the data …
and exploit them to deduce useful information about the data being processed or the data …
Protection against side channels
C Pepin, F Lecocq, V Servant - US Patent 9,515,820, 2016 - Google Patents
The description pertains in particular to a method of protecting an electronic device
(SCARD), when the electronic device implements a cryptographic algorithm (AES), against …
(SCARD), when the electronic device implements a cryptographic algorithm (AES), against …
Side-Channel Attack of Lightweight Cryptography Based on MixColumn: Case Study of PRINCE
J Xue, X Jiang, P Li, W Xi, C Xu, K Huang - Electronics, 2023 - mdpi.com
Lightweight cryptography is implemented in unrolled architecture generally, which has the
characteristics of low latency and high real-time performance but also faces the threat of …
characteristics of low latency and high real-time performance but also faces the threat of …