Power side-channel attack analysis: A review of 20 years of study for the layman

M Randolph, W Diehl - Cryptography, 2020 - mdpi.com
Physical cryptographic implementations are vulnerable to so-called side-channel attacks, in
which sensitive information can be recovered by analyzing physical phenomena of a device …

Non-profiled deep learning-based side-channel attacks with sensitivity analysis

B Timon - IACR Transactions on Cryptographic Hardware and …, 2019 - tches.iacr.org
Deep Learning has recently been introduced as a new alternative to perform Side-Channel
analysis [MPP16]. Until now, studies have been focused on applying Deep Learning …

A comprehensive survey on the non-invasive passive side-channel analysis

P Socha, V Miškovský, M Novotný - Sensors, 2022 - mdpi.com
Side-channel analysis has become a widely recognized threat to the security of
cryptographic implementations. Different side-channel attacks, as well as countermeasures …

LS-designs: Bitslice encryption for efficient masked software implementations

V Grosso, G Leurent, FX Standaert, K Varıcı - … 2014, London, UK, March 3-5 …, 2015 - Springer
Side-channel analysis is an important issue for the security of embedded cryptographic
devices, and masking is one of the most investigated solutions to mitigate such attacks. In …

From improved leakage detection to the detection of points of interests in leakage traces

F Durvaux, FX Standaert - … in Cryptology–EUROCRYPT 2016: 35th Annual …, 2016 - Springer
Leakage detection usually refers to the task of identifying data-dependent information in side-
channel measurements, independent of whether this information can be exploited. Detecting …

Block ciphers that are easier to mask: How far can we go?

B Gérard, V Grosso, M Naya-Plasencia… - … and Embedded Systems …, 2013 - Springer
The design and analysis of lightweight block ciphers has been a very active research area
over the last couple of years, with many innovative proposals trying to optimize different …

Leakage detection with the x2-test

A Moradi, B Richter, T Schneider… - IACR Transactions on …, 2018 - tches.iacr.org
We describe how Pearson's χ 2-test can be used as a natural complement to Welch's t-test
for black box leakage detection. In particular, we show that by using these two tests in …

Good is not good enough: Deriving optimal distinguishers from communication theory

A Heuser, O Rioul, S Guilley - … and Embedded Systems–CHES 2014: 16th …, 2014 - Springer
We find mathematically optimal side-channel distinguishers by looking at the side-channel
as a communication channel. Our methodology can be adapted to any given scenario …

Towards Practical Tools for Side Channel Aware Software Engineering:'Grey Box'Modelling for Instruction Leakages

D McCann, E Oswald, C Whitnall - 26th USENIX security symposium …, 2017 - usenix.org
Power (along with EM, cache and timing) leaks are of considerable concern for developers
who have to deal with cryptographic components as part of their overall software …

Fake it till you make it: Data augmentation using generative adversarial networks for all the crypto you need on small devices

N Mukhtar, L Batina, S Picek, Y Kong - Cryptographers' Track at the RSA …, 2022 - Springer
Deep learning-based side-channel analysis performance heavily depends on the dataset
size and the number of instances in each target class. Both small and imbalanced datasets …