Correlation power analysis of lightweight block ciphers: From theory to practice

A Biryukov, D Dinu, J Großschädl - … , ACNS 2016, Guildford, UK, June 19 …, 2016 - Springer
Abstract Side-Channel Analysis (SCA) represents a serious threat to the security of millions
of smart devices that form part of the so-called Internet of Things (IoT). Choosing the “right” …

Blind Side Channel Analysis Against AEAD with a Belief Propagation Approach

M Sarry, H Le Bouder, E Maaloouf… - … Conference on Smart Card …, 2023 - Springer
This paper present two new attacks on two lightweight authenticated encryption with
associated data (AEAD): Sparkle and Elephant. These attacks are blind side channel …

Efficient and secure implementations of lightweight symmetric cryptographic primitives

DD Dinu - 2017 - orbilu.uni.lu
[en] This thesis is devoted to efficient and secure implementations of lightweight symmetric
cryptographic primitives for resource-constrained devices such as wireless sensors and …

Exploiting Redundant Designs with Side-Channel Attacks

N Costes - 2024 - bora.uib.no
Side-Channel Attacks (SCA) are a broad class of attacks that exploit an unexpected leakage
of information, allowing an attacker to side-step a security measure. Why would you go …

[PDF][PDF] Symmetric cryptography applied in different contexts: physical attacks and ransomware.

H Le Bouder - 2023 - hal.science
Symmetric cryptography applied in different contexts: physical attacks and ransomware. Page 1
HAL Id: tel-04245908 https://hal.science/tel-04245908 Submitted on 17 Oct 2023 HAL is a …

Blind Side Channel Analysis against AEAD with a Belief Propagation Approach

H Le Bouder, M Sarry, E Maalouf… - CARDIS (Smart Card …, 2023 - hal.science
This paper present two new attacks on two lightweight authenticated encryption with
associated data (AEAD): Sparkle and Elephant. These attacks are blind side channel …

Timing attack and countermeasure on NEMS relay based design of block ciphers

B Mazumdar, SM Saeed, SS Ali… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Scaling down CMOS technology results in excessive power dissipation issues.
Nanoelectromechanical System (NEMS) relay technology is an alternative emerging …

[PDF][PDF] 해밍웨이트누출기반ARIA 키확장SPA

박애선, 한동국, 최준 - 정보보호학회논문지, 2015 - koreascience.kr
요 약 AES, ARIA 와 같은 대칭키 암호 알고리즘은 각 라운드 마다 사용되는 라운드 키를 키 확장
메커니즘을 통해 생성한다. 이러한 키 확장 메커니즘이 실행 될 때 소비되는 전력은, 비밀키에 …

[引用][C] A Simple Power Analysis Attack on ARIA Key Expansion Based on Hamming Weight Leakage

A Park, DG Han, J Choi - Journal of the …, 2015 - Korea Institute of Information …