Correlation power analysis of lightweight block ciphers: From theory to practice
Abstract Side-Channel Analysis (SCA) represents a serious threat to the security of millions
of smart devices that form part of the so-called Internet of Things (IoT). Choosing the “right” …
of smart devices that form part of the so-called Internet of Things (IoT). Choosing the “right” …
Blind Side Channel Analysis Against AEAD with a Belief Propagation Approach
M Sarry, H Le Bouder, E Maaloouf… - … Conference on Smart Card …, 2023 - Springer
This paper present two new attacks on two lightweight authenticated encryption with
associated data (AEAD): Sparkle and Elephant. These attacks are blind side channel …
associated data (AEAD): Sparkle and Elephant. These attacks are blind side channel …
Efficient and secure implementations of lightweight symmetric cryptographic primitives
DD Dinu - 2017 - orbilu.uni.lu
[en] This thesis is devoted to efficient and secure implementations of lightweight symmetric
cryptographic primitives for resource-constrained devices such as wireless sensors and …
cryptographic primitives for resource-constrained devices such as wireless sensors and …
Exploiting Redundant Designs with Side-Channel Attacks
N Costes - 2024 - bora.uib.no
Side-Channel Attacks (SCA) are a broad class of attacks that exploit an unexpected leakage
of information, allowing an attacker to side-step a security measure. Why would you go …
of information, allowing an attacker to side-step a security measure. Why would you go …
[PDF][PDF] Symmetric cryptography applied in different contexts: physical attacks and ransomware.
H Le Bouder - 2023 - hal.science
Symmetric cryptography applied in different contexts: physical attacks and ransomware. Page 1
HAL Id: tel-04245908 https://hal.science/tel-04245908 Submitted on 17 Oct 2023 HAL is a …
HAL Id: tel-04245908 https://hal.science/tel-04245908 Submitted on 17 Oct 2023 HAL is a …
Blind Side Channel Analysis against AEAD with a Belief Propagation Approach
H Le Bouder, M Sarry, E Maalouf… - CARDIS (Smart Card …, 2023 - hal.science
This paper present two new attacks on two lightweight authenticated encryption with
associated data (AEAD): Sparkle and Elephant. These attacks are blind side channel …
associated data (AEAD): Sparkle and Elephant. These attacks are blind side channel …
Timing attack and countermeasure on NEMS relay based design of block ciphers
Scaling down CMOS technology results in excessive power dissipation issues.
Nanoelectromechanical System (NEMS) relay technology is an alternative emerging …
Nanoelectromechanical System (NEMS) relay technology is an alternative emerging …
[PDF][PDF] 해밍웨이트누출기반ARIA 키확장SPA
박애선, 한동국, 최준 - 정보보호학회논문지, 2015 - koreascience.kr
요 약 AES, ARIA 와 같은 대칭키 암호 알고리즘은 각 라운드 마다 사용되는 라운드 키를 키 확장
메커니즘을 통해 생성한다. 이러한 키 확장 메커니즘이 실행 될 때 소비되는 전력은, 비밀키에 …
메커니즘을 통해 생성한다. 이러한 키 확장 메커니즘이 실행 될 때 소비되는 전력은, 비밀키에 …