Securing CRYSTALS-Kyber in FPGA using duplication and clock randomization

M Moraitis, Y Ji, M Brisfors, E Dubrova… - IEEE Design & …, 2023 - ieeexplore.ieee.org
Editor's notes: Postquantum cryptographic circuits bring in new implementation for which
new side-channel attacks (SCAs) have been discovered including machine-learning-guided …

Design and Implementation of Lightweight Certificateless Secure Communication Scheme on Industrial NFV-Based IPv6 Virtual Networks

Z Ashraf, A Sohail, M Iqbal - Electronics, 2024 - openresearch.lsbu.ac.uk
With the fast growth of the Industrial Internet of Everything (IIoE), computing and
telecommunication industries all over the world are moving rapidly towards the IPv6 address …

A side-channel resistant implementation of AES combining clock randomization with duplication

M Moraitis, M Brisfors, E Dubrova… - … on Circuits and …, 2023 - ieeexplore.ieee.org
Deep learning transformed side-channel analysis and made many conventional
countermeasures obsolete. This brings the need for more effective, deep learning-resistant …

Practical Improvements to Statistical Ineffective Fault Attacks

B Ege, B Swinkels, D Toprakhisar… - International Workshop on …, 2024 - Springer
Abstract Statistical Fault Attacks (SFA), introduced by Fuhr et al., exploit the statistical bias
resulting from injected faults. Unlike prior fault analysis attacks, which require both faulty and …

Compacting Side-Channel Measurements With Amplitude Peak Location Algorithm

TH Tran, DT Dam, BA Dao, VP Hoang… - … Transactions on Very …, 2023 - ieeexplore.ieee.org
Nowadays, cryptographic algorithms are widely used to build safety mechanisms for specific
objects in security services. Nevertheless, these algorithms are implemented in the …

Unpacking Needs Protection

R Wang, K Ngo, J Gärtner, E Dubrova - IACR Communications in …, 2024 - cic.iacr.org
Most of the previous attacks on Dilithium exploit side-channel information which is leaked
during the computation of the polynomial multiplication cs1, where s1 is a small-norm secret …

Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure

M Brisfors, M Moraitis, GK Landin, T Jilborg - International Symposium on …, 2023 - Springer
The emergence of deep learning has revolutionized side-channel attacks, making them a
serious threat to cryptographic systems. Clock randomization is a well-established mitigation …

Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks

TH Tran, DT Dam, B Kieu-Do-Nguyen… - 2024 21st Annual …, 2024 - ieeexplore.ieee.org
Side-channel attacks have emerged as the predominant approach for exploiting the
weaknesses of cryptographic equipment. Therefore, it is becoming increasingly necessary to …

Check for Practical Improvements to Statistical Ineffective Fault Attacks Barış Ege¹, Bob Swinkels¹, Dilara Toprakhisar2 () and Praveen Kumar Vadnala¹D

KU COSIC - Constructive Side-channel Analysis and Secure …, 2024 - books.google.com
Statistical Fault Attacks (SFA), introduced by Fuhr et al., exploit the statistical bias resulting
from injected faults. Unlike prior fault analysis attacks, which require both faulty and correct …

Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure

G Klasson Landin, T Julborg - 2023 - diva-portal.org
Side-channel attacks pose significant challenges to the security of embedded systems, often
allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of …