[PDF][PDF] 侧信道攻击与防御技术研究进展
王永娟, 樊昊鹏, 代政一, 袁庆军, 王相宾 - 计算机学报, 2023 - 159.226.43.17
摘要侧信道攻击利用密码实现的物理泄露而不是理论弱点来恢复密钥, 对密码系统的安全实现有
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
Making masking security proofs concrete: or how to evaluate the security of any leaking device
We investigate the relationships between theoretical studies of leaking cryptographic
devices and concrete security evaluations with standard side-channel attacks. Our …
devices and concrete security evaluations with standard side-channel attacks. Our …
From improved leakage detection to the detection of points of interests in leakage traces
F Durvaux, FX Standaert - … in Cryptology–EUROCRYPT 2016: 35th Annual …, 2016 - Springer
Leakage detection usually refers to the task of identifying data-dependent information in side-
channel measurements, independent of whether this information can be exploited. Detecting …
channel measurements, independent of whether this information can be exploited. Detecting …
Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
We investigate the relationship between theoretical studies of leaking cryptographic devices
and concrete security evaluations with standard side-channel attacks. Our contributions are …
and concrete security evaluations with standard side-channel attacks. Our contributions are …
Fast and memory-efficient key recovery in side-channel attacks
A Bogdanov, I Kizhvatov, K Manzoor… - Selected Areas in …, 2016 - Springer
Side-channel attacks are powerful techniques to attack implementations of cryptographic
algorithms by observing its physical parameters such as power consumption and …
algorithms by observing its physical parameters such as power consumption and …
Masking proofs are tight and how to exploit it in security evaluations
V Grosso, FX Standaert - … in Cryptology–EUROCRYPT 2018: 37th Annual …, 2018 - Springer
Evaluating the security level of a leaking implementation against side-channel attacks is a
challenging task. This is especially true when countermeasures such as masking are …
challenging task. This is especially true when countermeasures such as masking are …
Correlation power analysis of lightweight block ciphers: From theory to practice
Abstract Side-Channel Analysis (SCA) represents a serious threat to the security of millions
of smart devices that form part of the so-called Internet of Things (IoT). Choosing the “right” …
of smart devices that form part of the so-called Internet of Things (IoT). Choosing the “right” …
Computational aspects of correlation power analysis
P Bottinelli, JW Bos - Journal of Cryptographic Engineering, 2017 - Springer
Since the discovery of simple power attacks, the cryptographic research community has
developed significantly more advanced attack methods. The idea behind most algorithms …
developed significantly more advanced attack methods. The idea behind most algorithms …
Modeling soft analytical side-channel attacks from a coding theory viewpoint
One important open question in side-channel analysis is to find out whether all the leakage
samples in an implementation can be exploited by an adversary, as suggested by masking …
samples in an implementation can be exploited by an adversary, as suggested by masking …
ASCA, SASCA and DPA with enumeration: which one beats the other and when?
V Grosso, FX Standaert - Advances in Cryptology–ASIACRYPT 2015: 21st …, 2015 - Springer
We describe three contributions regarding the Soft Analytical Side-Channel Attacks
(SASCA) introduced at Asiacrypt 2014. First, we compare them with Algebraic Side-Channel …
(SASCA) introduced at Asiacrypt 2014. First, we compare them with Algebraic Side-Channel …