Cryptanalysis of masked ciphers: A not so random idea

T Beyne, S Dhooghe, Z Zhang - … Conference on the Theory and Application …, 2020 - Springer
A new approach to the security analysis of hardware-oriented masked ciphers against
second-order side-channel attacks is developed. By relying on techniques from symmetric …

Improving first-order threshold implementations of skinny

A Caforio, D Collins, O Glamočanin, S Banik - Progress in Cryptology …, 2021 - Springer
Threshold Implementations have become a popular generic technique to construct circuits
resilient against power analysis attacks. In this paper, we look to devise efficient threshold …

A geometric approach to symmetric-key cryptanalysis

T Beyne - 2023 - lirias.kuleuven.be
The first part of this thesis develops a general approach to symmetric-key cryptanalysis. It
brings together linear, differential and integral cryptanalysis in a single framework, and …

Circuit-Variant Moving Target Defense for Side-Channel Attacks on Reconfigurable Hardware

TH Mullins - 2022 - search.proquest.com
With the emergence of side-channel analysis (SCA) attacks, bits of a secret key may be
derived by correlating key values with physical properties of cryptographic process …