Cryptanalysis of masked ciphers: A not so random idea
A new approach to the security analysis of hardware-oriented masked ciphers against
second-order side-channel attacks is developed. By relying on techniques from symmetric …
second-order side-channel attacks is developed. By relying on techniques from symmetric …
Improving first-order threshold implementations of skinny
Threshold Implementations have become a popular generic technique to construct circuits
resilient against power analysis attacks. In this paper, we look to devise efficient threshold …
resilient against power analysis attacks. In this paper, we look to devise efficient threshold …
A geometric approach to symmetric-key cryptanalysis
T Beyne - 2023 - lirias.kuleuven.be
The first part of this thesis develops a general approach to symmetric-key cryptanalysis. It
brings together linear, differential and integral cryptanalysis in a single framework, and …
brings together linear, differential and integral cryptanalysis in a single framework, and …
Circuit-Variant Moving Target Defense for Side-Channel Attacks on Reconfigurable Hardware
TH Mullins - 2022 - search.proquest.com
With the emergence of side-channel analysis (SCA) attacks, bits of a secret key may be
derived by correlating key values with physical properties of cryptographic process …
derived by correlating key values with physical properties of cryptographic process …