LS-designs: Bitslice encryption for efficient masked software implementations

V Grosso, G Leurent, FX Standaert, K Varıcı - … 2014, London, UK, March 3-5 …, 2015 - Springer
Side-channel analysis is an important issue for the security of embedded cryptographic
devices, and masking is one of the most investigated solutions to mitigate such attacks. In …

Block ciphers that are easier to mask: How far can we go?

B Gérard, V Grosso, M Naya-Plasencia… - … and Embedded Systems …, 2013 - Springer
The design and analysis of lightweight block ciphers has been a very active research area
over the last couple of years, with many innovative proposals trying to optimize different …

NICV: normalized inter-class variance for detection of side-channel leakage

S Bhasin, JL Danger, S Guilley… - 2014 International …, 2014 - ieeexplore.ieee.org
Side-Channel Attacks (SCA) are considered a serious threat against embedded
cryptography. Therefore security critical chips must be tested for SCA resistance before …

Support vector regression: exploiting machine learning techniques for leakage modeling

D Jap, M Stöttinger, S Bhasin - Proceedings of the Fourth Workshop on …, 2015 - dl.acm.org
Side-channel analysis (SCA) is a serious threat to embedded cryptography. Any SCA has
two important components: leakage modeling and distinguisher. Although distinguisher has …

Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations

D Kamel, M Renauld, D Flandre… - Journal of Cryptographic …, 2014 - Springer
Simulation is a very powerful tool for hardware designers. It generally allows the preliminary
evaluation of a chip's performance before its final tape out. As security against side-channel …

On the relationship between correlation power analysis and the stochastic approach: an ASIC designer perspective

F De Santis, M Kasper, S Mangard, G Sigl… - … on Cryptology in India, 2013 - Springer
The design and the security verification of side-channel resistant cryptographic hardware
often represent an iterative process. This process essentially consists of a detection phase …

[PDF][PDF] Ascend: An architecture for performing secure computation on encrypted data

CW Fletcher - 2013 - Citeseer
This thesis considers encrypted computation where the user specifies encrypted inputs to an
untrusted batch program controlled by an untrusted server. In batch computation, all data …

Multivariate leakage model for improving non-profiling DPA on noisy power traces

S Hajra, D Mukhopadhyay - … 2013, Guangzhou, China, November 27-30 …, 2014 - Springer
Profiling power attacks like Template attack and Stochastic attack optimize their performance
by jointly evaluating the leakages of multiple sample points. However, such multivariate …

A unified formalism for physical attacks

H Le Bouder, R Lashermes, Y Linge… - Cryptology ePrint …, 2014 - eprint.iacr.org
The security of cryptographic algorithms can be considered in two contexts. On the one
hand, these algorithms can be proven secure mathematically. On the other hand, physical …

UN FORMALISME UNIFIANT LES ATTAQUES PHYSIQUES SUR CIRCUITS CRYTOGRAPHIQUES ET SON EXPLOITATION AFIN DE COMPARER ET …

H Le Bouder - 2014 - theses.hal.science
Cette thèse se situe dans la cryptanalyse physique des algorithmes de chiffrement par
blocs. Un algorithme cryptographique est conçu pour être mathématiquement robuste …