The side-channel metrics cheat sheet

K Papagiannopoulos, O Glamočanin… - ACM Computing …, 2023 - dl.acm.org
Side-channel attacks exploit a physical observable originating from a cryptographic device
in order to extract its secrets. Many practically relevant advances in the field of side-channel …

How (not) to use welch's t-test in side-channel security evaluations

FX Standaert - Smart Card Research and Advanced Applications: 17th …, 2019 - Springer
Abstract The Test Vector Leakage Assessment (TVLA) methodology is a qualitative tool
relying on Welch's T-test to assess the security of cryptographic implementations against …

Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter

O Bronchain, FX Standaert - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
We explore the concrete side-channel security provided by state-of-theart higher-order
masked software implementations of the AES and the (candidate to the NIST Lightweight …

Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle

D Bellizia, O Bronchain, G Cassiers, V Grosso… - Advances in Cryptology …, 2020 - Springer
Triggered by the increasing deployment of embedded cryptographic devices (eg, for the
IoT), the design of authentication, encryption and authenticated encryption schemes …

Single-trace attacks on keccak

MJ Kannwischer, P Pessl, R Primas - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Since its selection as the winner of the SHA-3 competition, Keccak, with all its variants, has
found a large number of applications. It is, for instance, a common building block in schemes …

A systematic appraisal of side channel evaluation strategies

M Azouaoui, D Bellizia, I Buhan, N Debande… - … Conference, SSR 2020 …, 2020 - Springer
In this paper we examine the central question that is how well do side channel evaluation
regimes capture the true security level of a product. Concretely, answering this question …

Leakage certification revisited: Bounding model errors in side-channel security evaluations

O Bronchain, JM Hendrickx, C Massart… - Advances in Cryptology …, 2019 - Springer
Leakage certification aims at guaranteeing that the statistical models used in side-channel
security evaluations are close to the true statistical distribution of the leakages, hence can be …

Side-channel countermeasures' dissection and the limits of closed source security evaluations

O Bronchain, FX Standaert - IACR Transactions on Cryptographic …, 2020 - tches.iacr.org
We take advantage of a recently published open source implementation of the AES
protected with a mix of countermeasures against side-channel attacks to discuss both the …

Practical leverage-based sampling for low-rank tensor decomposition

BW Larsen, TG Kolda - SIAM Journal on Matrix Analysis and Applications, 2022 - SIAM
The low-rank canonical polyadic tensor decomposition is useful in data analysis and can be
computed by solving a sequence of overdetermined least squares subproblems. Motivated …

GE vs GM: Efficient side-channel security evaluations on full cryptographic keys

A Rădulescu, PG Popescu… - IACR Transactions on …, 2022 - tches.iacr.org
Security evaluations for full cryptographic keys is a very important research topic since the
past decade. An efficient rank estimation algorithm was proposed at FSE 2015 to …