Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3

SD Putra, M Yudhiprawira, S Sutikno… - TELKOMNIKA …, 2019 - telkomnika.uad.ac.id
Cryptography is a science of creating a secret message and it is constantly developed. The
development consists of attacking and defending the cryptography itself. Power analysis is …

A novel design flow for a security-driven synthesis of side-channel hardened cryptographic modules

SA Huss, O Stein - Journal of Low Power Electronics and Applications, 2017 - mdpi.com
Over the last few decades, computer-aided engineering (CAE) tools have been developed
and improved in order to ensure a short time-to-market in the chip design business. Up to …

Securing RSA against power analysis attacks through non‐uniform exponent partitioning with randomisation

HJ Mahanta, AK Khan - IET Information Security, 2018 - Wiley Online Library
This study presents an approach to compute randomised modular exponentiation through
non‐uniform exponent partitioning. The exponent has been first partitioned into multiple …

Correlation power analysis distinguisher based on the correlation trace derivative

P Socha, V Miškovský, H Kubátová… - 2018 21st Euromicro …, 2018 - ieeexplore.ieee.org
Correlation power analysis (CPA) is one of the most common side channel attacks today,
posing a threat to many modern ciphers, including AES. The simplest method to extract the …

A note on the use of margins to compare distinguishers

O Reparaz, B Gierlichs, I Verbauwhede - … 2014, Paris, France, April 13-15 …, 2014 - Springer
A Note on the Use of Margins to Compare Distinguishers | SpringerLink Skip to main content
Advertisement SpringerLink Account Menu Find a journal Publish with us Track your research …

An adaptable, modular, and autonomous side-channel vulnerability evaluator

M Zohner, M Stöttinger, SA Huss… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
Computer aided design (CAD) tools are fundamental for ensuring a short time-to-market in
nowadays chip design. However, while CAD tools support the development of efficient …

Efficient algorithmic evaluation of correlation power analysis: Key distinguisher based on the correlation trace derivative

P Socha, V Miškovský, H Kubátová… - Microprocessors and …, 2019 - Elsevier
Correlation power analysis (CPA) is one of the most common side-channel attacks today,
posing a threat to many modern ciphers, including AES. In the final step of this attack, the …

Blurred Image Region Detection based on Stacked Auto-Encoder

Y Zhou, J Yang, Y Chen… - 2018 24th International …, 2018 - ieeexplore.ieee.org
In this study, we address a fundamental yet challenging problem on detection and
classification of blurred regions in partially blurred images. we propose to learn a latent …

[图书][B] Improved first-order power analysis attacks on low entropy masking schemes

BG Cozzens - 2015 - search.proquest.com
Masking countermeasures are effective methods of protecting encryption algorithms from
side-channel attacks; however, a masked cipher incurs a significant overhead in …