Efficient regression-based linear discriminant analysis for side-channel security evaluations: Towards analytical attacks against 32-bit implementations
bit software implementations become increasingly popular for embedded security
applications. As a result, profiling 32-bit target intermediate values becomes increasingly …
applications. As a result, profiling 32-bit target intermediate values becomes increasingly …
Conditional variational autoencoder based on stochastic attacks
Over the recent years, the cryptanalysis community leveraged the potential of research on
Deep Learning to enhance attacks. In particular, several studies have recently highlighted …
Deep Learning to enhance attacks. In particular, several studies have recently highlighted …
Leakyohm: Secret bits extraction using impedance analysis
The threats of physical side-channel attacks and their countermeasures have been widely
researched. Most physical side-channel attacks rely on the unavoidable influence of …
researched. Most physical side-channel attacks rely on the unavoidable influence of …
[PDF][PDF] DEVELOPMENT OF THE AUTOMATED DECISIONMAKING SYSTEM SYNTHESIS METHOD IN THE MANAGEMENT OF INFORMATION SECURITY …
O Shmatko, S Herasymov, Y Lysetskyi… - … -European Journal of …, 2023 - researchgate.net
In the process of transmission channels functioning, the results of the work of bodies for
detecting and blocking information leakage channels are not sufficiently taken into account …
detecting and blocking information leakage channels are not sufficiently taken into account …
When side-channel attacks break the black-box property of embedded artificial intelligence
B Coqueret, M Carbone, O Sentieys… - Proceedings of the 16th …, 2023 - dl.acm.org
Artificial intelligence, and specifically deep neural networks (DNNs), has rapidly emerged in
the past decade as the standard for several tasks from specific advertising to object …
the past decade as the standard for several tasks from specific advertising to object …
The SMAesH dataset
G Cassiers, C Momin - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Datasets of side-channel leakage measurements are widely used in research to develop
and benchmarking side-channel attack and evaluation methodologies. Compared to using …
and benchmarking side-channel attack and evaluation methodologies. Compared to using …
Leakage Certification Made Simple
Side channel evaluations benefit from sound characterisations of adversarial leakage
models, which are the determining factor for attack success. Two questions are of interest …
models, which are the determining factor for attack success. Two questions are of interest …
DEVELOPMENT OF A MODEL OF THE INFORMATION AND ANALYTICAL SYSTEM FOR MAKING DECISIONS ON DETECTING FAILURES OF INFORMATION …
The object of the research is the channels of information transmission during the control of
the information-analytical decision-making system. The development of high technologies …
the information-analytical decision-making system. The development of high technologies …
[PDF][PDF] Composable and efficient masking schemes for side-channel secure implementations.
G Cassiers - 2022 - dial.uclouvain.be
Modern cryptography has been widely deployed in the last decades, allowing any
computing device to secure its communications. Facing the strength of the cryptographic …
computing device to secure its communications. Facing the strength of the cryptographic …
[PDF][PDF] Side‐Channel Analysis and Leakage‐Resistance
FX Standaert - perso.uclouvain.be
Modern “cryptography is the scienfific study of techniques for securing digital in‐formafion,
transacfions and distributed compufing”[KL14]. Since the early nine‐teen‐eighties, the good …
transacfions and distributed compufing”[KL14]. Since the early nine‐teen‐eighties, the good …