Securing CRYSTALS-Kyber in FPGA using duplication and clock randomization
Editor's notes: Postquantum cryptographic circuits bring in new implementation for which
new side-channel attacks (SCAs) have been discovered including machine-learning-guided …
new side-channel attacks (SCAs) have been discovered including machine-learning-guided …
Design and Implementation of Lightweight Certificateless Secure Communication Scheme on Industrial NFV-Based IPv6 Virtual Networks
With the fast growth of the Industrial Internet of Everything (IIoE), computing and
telecommunication industries all over the world are moving rapidly towards the IPv6 address …
telecommunication industries all over the world are moving rapidly towards the IPv6 address …
A side-channel resistant implementation of AES combining clock randomization with duplication
Deep learning transformed side-channel analysis and made many conventional
countermeasures obsolete. This brings the need for more effective, deep learning-resistant …
countermeasures obsolete. This brings the need for more effective, deep learning-resistant …
Practical Improvements to Statistical Ineffective Fault Attacks
B Ege, B Swinkels, D Toprakhisar… - International Workshop on …, 2024 - Springer
Abstract Statistical Fault Attacks (SFA), introduced by Fuhr et al., exploit the statistical bias
resulting from injected faults. Unlike prior fault analysis attacks, which require both faulty and …
resulting from injected faults. Unlike prior fault analysis attacks, which require both faulty and …
Compacting Side-Channel Measurements With Amplitude Peak Location Algorithm
Nowadays, cryptographic algorithms are widely used to build safety mechanisms for specific
objects in security services. Nevertheless, these algorithms are implemented in the …
objects in security services. Nevertheless, these algorithms are implemented in the …
Unpacking Needs Protection
Most of the previous attacks on Dilithium exploit side-channel information which is leaked
during the computation of the polynomial multiplication cs1, where s1 is a small-norm secret …
during the computation of the polynomial multiplication cs1, where s1 is a small-norm secret …
Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure
M Brisfors, M Moraitis, GK Landin, T Jilborg - International Symposium on …, 2023 - Springer
The emergence of deep learning has revolutionized side-channel attacks, making them a
serious threat to cryptographic systems. Clock randomization is a well-established mitigation …
serious threat to cryptographic systems. Clock randomization is a well-established mitigation …
Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks
Side-channel attacks have emerged as the predominant approach for exploiting the
weaknesses of cryptographic equipment. Therefore, it is becoming increasingly necessary to …
weaknesses of cryptographic equipment. Therefore, it is becoming increasingly necessary to …
Check for Practical Improvements to Statistical Ineffective Fault Attacks Barış Ege¹, Bob Swinkels¹, Dilara Toprakhisar2 () and Praveen Kumar Vadnala¹D
KU COSIC - Constructive Side-channel Analysis and Secure …, 2024 - books.google.com
Statistical Fault Attacks (SFA), introduced by Fuhr et al., exploit the statistical bias resulting
from injected faults. Unlike prior fault analysis attacks, which require both faulty and correct …
from injected faults. Unlike prior fault analysis attacks, which require both faulty and correct …
Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure
G Klasson Landin, T Julborg - 2023 - diva-portal.org
Side-channel attacks pose significant challenges to the security of embedded systems, often
allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of …
allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of …