TROT: A three-edge ring oscillator based true random number generator with time-to-digital conversion
M Grujić, I Verbauwhede - … on Circuits and Systems I: Regular …, 2022 - ieeexplore.ieee.org
This paper introduces a new true random number generator (TRNG) based on a three-edge
ring oscillator. Our design uses a new technique with a time-to-digital converter to effectively …
ring oscillator. Our design uses a new technique with a time-to-digital converter to effectively …
Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks
This paper formally analyzes two major non-profiled deep-learning-based side-channel
attacks (DL-SCAs): differential deep-learning analysis (DDLA) by Timon and collision DL …
attacks (DL-SCAs): differential deep-learning analysis (DDLA) by Timon and collision DL …
SoK: Pseudorandom Generation for Masked Cryptographic Implementation
This paper investigates pseudorandom generation in the context of masked cryptographic
implementation. Although masking and pseudorandom generators (PRGs) have been …
implementation. Although masking and pseudorandom generators (PRGs) have been …
Side-channel analysis against SecOC-compliant AES-CMAC
This brief presents a side-channel analysis (SCA) attack for AES-CMAC, which is used in the
controller area network (CAN) protocol for in-vehicle networks. It is difficult to apply …
controller area network (CAN) protocol for in-vehicle networks. It is difficult to apply …
[PDF][PDF] Deep learning-enhanced side-channel analysis of cryptographic implementations
B Hettwer - 2021 - d-nb.info
Integrated microelectronic system are ubiquitous nowadays-no computer, no car, and no
identity card could operate today without microelectronics or embedded systems in general …
identity card could operate today without microelectronics or embedded systems in general …
Template Attack Against AES in Counter Mode With Unknown Initial Counter
M Tienteu, E Smith, EM Santillan… - 2023 IEEE 13th …, 2023 - ieeexplore.ieee.org
Despite long-contested viability, numerous applications still rely upon Advance Encryption
Standard (AES) in Counter mode (AES-CTR). Research supports that the vulnerabilities …
Standard (AES) in Counter mode (AES-CTR). Research supports that the vulnerabilities …
Advanced Encryption Standard in Counter Mode Electromagnetic Analysis Using Template Attack
M Tienteu - 2023 - search.proquest.com
Embedded devices such as smart cards, cell phones, personal digital assistants (PDAs),
and passports rely on cryptosystems to perform secure operations or transactions …
and passports rely on cryptosystems to perform secure operations or transactions …
White-Box PRNG: A Secure Pseudo-Random Number Generator under the White-Box Attack Model
W Deng - 2023 7th International Conference on Cryptography …, 2023 - ieeexplore.ieee.org
The random number generator (RNG) plays a crucial role in modern cryptography. While
true RNG (TRNG) is available, pseudo RNG (PRNG) is often preferred due to its better …
true RNG (TRNG) is available, pseudo RNG (PRNG) is often preferred due to its better …
Advanced Encryption Standard in Counter Mode Analysis Using Enhanced Jaffe Method
EH Smith - 2023 - search.proquest.com
Rapid physical device development and manufacturing growth have increased information
leakage through covert channels. These covert channels make it difficult to ascertain the …
leakage through covert channels. These covert channels make it difficult to ascertain the …
[PDF][PDF] New Security Models for Passive and Active Physical Attacks
S Dhooghe - 2021 - lirias.kuleuven.be
Symmetric key cryptography has been the corner stone in defending applications against
cyber attacks. Ever since the proposal of the Data Encryption Standard (DES), people were …
cyber attacks. Ever since the proposal of the Data Encryption Standard (DES), people were …