Power side-channel attack analysis: A review of 20 years of study for the layman
M Randolph, W Diehl - Cryptography, 2020 - mdpi.com
Physical cryptographic implementations are vulnerable to so-called side-channel attacks, in
which sensitive information can be recovered by analyzing physical phenomena of a device …
which sensitive information can be recovered by analyzing physical phenomena of a device …
Non-profiled deep learning-based side-channel attacks with sensitivity analysis
B Timon - IACR Transactions on Cryptographic Hardware and …, 2019 - tches.iacr.org
Deep Learning has recently been introduced as a new alternative to perform Side-Channel
analysis [MPP16]. Until now, studies have been focused on applying Deep Learning …
analysis [MPP16]. Until now, studies have been focused on applying Deep Learning …
A comprehensive survey on the non-invasive passive side-channel analysis
Side-channel analysis has become a widely recognized threat to the security of
cryptographic implementations. Different side-channel attacks, as well as countermeasures …
cryptographic implementations. Different side-channel attacks, as well as countermeasures …
LS-designs: Bitslice encryption for efficient masked software implementations
Side-channel analysis is an important issue for the security of embedded cryptographic
devices, and masking is one of the most investigated solutions to mitigate such attacks. In …
devices, and masking is one of the most investigated solutions to mitigate such attacks. In …
From improved leakage detection to the detection of points of interests in leakage traces
F Durvaux, FX Standaert - … in Cryptology–EUROCRYPT 2016: 35th Annual …, 2016 - Springer
Leakage detection usually refers to the task of identifying data-dependent information in side-
channel measurements, independent of whether this information can be exploited. Detecting …
channel measurements, independent of whether this information can be exploited. Detecting …
Block ciphers that are easier to mask: How far can we go?
B Gérard, V Grosso, M Naya-Plasencia… - … and Embedded Systems …, 2013 - Springer
The design and analysis of lightweight block ciphers has been a very active research area
over the last couple of years, with many innovative proposals trying to optimize different …
over the last couple of years, with many innovative proposals trying to optimize different …
Leakage detection with the x2-test
We describe how Pearson's χ 2-test can be used as a natural complement to Welch's t-test
for black box leakage detection. In particular, we show that by using these two tests in …
for black box leakage detection. In particular, we show that by using these two tests in …
Good is not good enough: Deriving optimal distinguishers from communication theory
We find mathematically optimal side-channel distinguishers by looking at the side-channel
as a communication channel. Our methodology can be adapted to any given scenario …
as a communication channel. Our methodology can be adapted to any given scenario …
Towards Practical Tools for Side Channel Aware Software Engineering:'Grey Box'Modelling for Instruction Leakages
D McCann, E Oswald, C Whitnall - 26th USENIX security symposium …, 2017 - usenix.org
Power (along with EM, cache and timing) leaks are of considerable concern for developers
who have to deal with cryptographic components as part of their overall software …
who have to deal with cryptographic components as part of their overall software …
Fake it till you make it: Data augmentation using generative adversarial networks for all the crypto you need on small devices
Deep learning-based side-channel analysis performance heavily depends on the dataset
size and the number of instances in each target class. Both small and imbalanced datasets …
size and the number of instances in each target class. Both small and imbalanced datasets …