[PDF][PDF] 侧信道攻击与防御技术研究进展
王永娟, 樊昊鹏, 代政一, 袁庆军, 王相宾 - 计算机学报, 2023 - 159.226.43.17
摘要侧信道攻击利用密码实现的物理泄露而不是理论弱点来恢复密钥, 对密码系统的安全实现有
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
A survey of leakage-resilient cryptography
In the past 15 years, cryptography has made considerable progress in expanding the
adversarial attack model to cover side-channel attacks and has built schemes to provably …
adversarial attack model to cover side-channel attacks and has built schemes to provably …
Effective and efficient masking with low noise using small-mersenne-prime ciphers
Embedded devices used in security applications are natural targets for physical attacks.
Thus, enhancing their side-channel resistance is an important research challenge. A …
Thus, enhancing their side-channel resistance is an important research challenge. A …
Optimizing inner product masking scheme by a coding theory approach
Masking is one of the most popular countermeasures to protect cryptographic
implementations against side-channel analysis since it is provably secure and can be …
implementations against side-channel analysis since it is provably secure and can be …
A first-order SCA resistant AES without fresh randomness
Since the advent of Differential Power Analysis (DPA) in the late 1990s protecting
embedded devices against Side-Channel Analysis (SCA) attacks has been a major …
embedded devices against Side-Channel Analysis (SCA) attacks has been a major …
Efficient and private computations with code-based masking
Code-based masking is a very general type of masking scheme that covers Boolean
masking, inner product masking, direct sum masking, and so on. The merits of the …
masking, inner product masking, direct sum masking, and so on. The merits of the …
Provable secure software masking in the real-world
We evaluate eight implementations of provable secure side-channel masking schemes that
were published in top-tier academic venues such as Eurocrypt, Asiacrypt, CHES and SAC …
were published in top-tier academic venues such as Eurocrypt, Asiacrypt, CHES and SAC …
On the effect of the (micro) architecture on the development of side-channel resistant software
L De Meyer, E De Mulder, M Tunstall - Cryptology ePrint Archive, 2020 - eprint.iacr.org
There are many examples of how to assess the side-channel resistance of a hardware
implementation for a given order, where one has to take into account all transitions and …
implementation for a given order, where one has to take into account all transitions and …
[图书][B] Side-channel analysis of embedded systems
M Ouladj, S Guilley - 2021 - Springer
As shown previously in Sect. 3.2. 3, the Correlation Power Analysis (CPA) is a method that
allows to recover the secret information concealed in embedded devices [1]. It consists in …
allows to recover the secret information concealed in embedded devices [1]. It consists in …
Circuit masking: from theory to standardization, a comprehensive survey for hardware security researchers and practitioners
Side-channel attacks extracting sensitive data from implementations have been considered
a major threat to the security of cryptographic schemes. This has elevated the need for …
a major threat to the security of cryptographic schemes. This has elevated the need for …