TROT: A three-edge ring oscillator based true random number generator with time-to-digital conversion

M Grujić, I Verbauwhede - … on Circuits and Systems I: Regular …, 2022 - ieeexplore.ieee.org
This paper introduces a new true random number generator (TRNG) based on a three-edge
ring oscillator. Our design uses a new technique with a time-to-digital converter to effectively …

Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks

A Ito, R Ueno, R Tanaka, N Homma - Cryptology ePrint Archive, 2023 - eprint.iacr.org
This paper formally analyzes two major non-profiled deep-learning-based side-channel
attacks (DL-SCAs): differential deep-learning analysis (DDLA) by Timon and collision DL …

SoK: Pseudorandom Generation for Masked Cryptographic Implementation

R Ueno, N Homma, A Inoue, K Minematsu - Cryptology ePrint Archive, 2024 - eprint.iacr.org
This paper investigates pseudorandom generation in the context of masked cryptographic
implementation. Although masking and pseudorandom generators (PRGs) have been …

Side-channel analysis against SecOC-compliant AES-CMAC

K Ebina, R Ueno, N Homma - IEEE Transactions on Circuits …, 2023 - ieeexplore.ieee.org
This brief presents a side-channel analysis (SCA) attack for AES-CMAC, which is used in the
controller area network (CAN) protocol for in-vehicle networks. It is difficult to apply …

[PDF][PDF] Deep learning-enhanced side-channel analysis of cryptographic implementations

B Hettwer - 2021 - d-nb.info
Integrated microelectronic system are ubiquitous nowadays-no computer, no car, and no
identity card could operate today without microelectronics or embedded systems in general …

Template Attack Against AES in Counter Mode With Unknown Initial Counter

M Tienteu, E Smith, EM Santillan… - 2023 IEEE 13th …, 2023 - ieeexplore.ieee.org
Despite long-contested viability, numerous applications still rely upon Advance Encryption
Standard (AES) in Counter mode (AES-CTR). Research supports that the vulnerabilities …

Advanced Encryption Standard in Counter Mode Electromagnetic Analysis Using Template Attack

M Tienteu - 2023 - search.proquest.com
Embedded devices such as smart cards, cell phones, personal digital assistants (PDAs),
and passports rely on cryptosystems to perform secure operations or transactions …

White-Box PRNG: A Secure Pseudo-Random Number Generator under the White-Box Attack Model

W Deng - 2023 7th International Conference on Cryptography …, 2023 - ieeexplore.ieee.org
The random number generator (RNG) plays a crucial role in modern cryptography. While
true RNG (TRNG) is available, pseudo RNG (PRNG) is often preferred due to its better …

Advanced Encryption Standard in Counter Mode Analysis Using Enhanced Jaffe Method

EH Smith - 2023 - search.proquest.com
Rapid physical device development and manufacturing growth have increased information
leakage through covert channels. These covert channels make it difficult to ascertain the …

[PDF][PDF] New Security Models for Passive and Active Physical Attacks

S Dhooghe - 2021 - lirias.kuleuven.be
Symmetric key cryptography has been the corner stone in defending applications against
cyber attacks. Ever since the proposal of the Data Encryption Standard (DES), people were …