Efficient regression-based linear discriminant analysis for side-channel security evaluations: Towards analytical attacks against 32-bit implementations

G Cassiers, H Devillez, FX Standaert… - IACR Transactions on …, 2023 - tches.iacr.org
bit software implementations become increasingly popular for embedded security
applications. As a result, profiling 32-bit target intermediate values becomes increasingly …

Conditional variational autoencoder based on stochastic attacks

G Zaid, L Bossuet, M Carbone, A Habrard… - IACR Transactions on …, 2023 - tches.iacr.org
Over the recent years, the cryptanalysis community leveraged the potential of research on
Deep Learning to enhance attacks. In particular, several studies have recently highlighted …

Leakyohm: Secret bits extraction using impedance analysis

SK Monfared, T Mosavirik, S Tajik - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
The threats of physical side-channel attacks and their countermeasures have been widely
researched. Most physical side-channel attacks rely on the unavoidable influence of …

[PDF][PDF] DEVELOPMENT OF THE AUTOMATED DECISIONMAKING SYSTEM SYNTHESIS METHOD IN THE MANAGEMENT OF INFORMATION SECURITY …

O Shmatko, S Herasymov, Y Lysetskyi… - … -European Journal of …, 2023 - researchgate.net
In the process of transmission channels functioning, the results of the work of bodies for
detecting and blocking information leakage channels are not sufficiently taken into account …

When side-channel attacks break the black-box property of embedded artificial intelligence

B Coqueret, M Carbone, O Sentieys… - Proceedings of the 16th …, 2023 - dl.acm.org
Artificial intelligence, and specifically deep neural networks (DNNs), has rapidly emerged in
the past decade as the standard for several tasks from specific advertising to object …

The SMAesH dataset

G Cassiers, C Momin - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Datasets of side-channel leakage measurements are widely used in research to develop
and benchmarking side-channel attack and evaluation methodologies. Compared to using …

Leakage Certification Made Simple

A Chowdhury, A Roy, C Brunetta, E Oswald - Annual International …, 2024 - Springer
Side channel evaluations benefit from sound characterisations of adversarial leakage
models, which are the determining factor for attack success. Two questions are of interest …

DEVELOPMENT OF A MODEL OF THE INFORMATION AND ANALYTICAL SYSTEM FOR MAKING DECISIONS ON DETECTING FAILURES OF INFORMATION …

O Shmatko, S Yevseiev, O Milov… - Eastern-European …, 2024 - search.ebscohost.com
The object of the research is the channels of information transmission during the control of
the information-analytical decision-making system. The development of high technologies …

[PDF][PDF] Composable and efficient masking schemes for side-channel secure implementations.

G Cassiers - 2022 - dial.uclouvain.be
Modern cryptography has been widely deployed in the last decades, allowing any
computing device to secure its communications. Facing the strength of the cryptographic …

[PDF][PDF] Side‐Channel Analysis and Leakage‐Resistance

FX Standaert - perso.uclouvain.be
Modern “cryptography is the scienfific study of techniques for securing digital in‐formafion,
transacfions and distributed compufing”[KL14]. Since the early nine‐teen‐eighties, the good …