LS-designs: Bitslice encryption for efficient masked software implementations
Side-channel analysis is an important issue for the security of embedded cryptographic
devices, and masking is one of the most investigated solutions to mitigate such attacks. In …
devices, and masking is one of the most investigated solutions to mitigate such attacks. In …
Block ciphers that are easier to mask: How far can we go?
B Gérard, V Grosso, M Naya-Plasencia… - … and Embedded Systems …, 2013 - Springer
The design and analysis of lightweight block ciphers has been a very active research area
over the last couple of years, with many innovative proposals trying to optimize different …
over the last couple of years, with many innovative proposals trying to optimize different …
NICV: normalized inter-class variance for detection of side-channel leakage
Side-Channel Attacks (SCA) are considered a serious threat against embedded
cryptography. Therefore security critical chips must be tested for SCA resistance before …
cryptography. Therefore security critical chips must be tested for SCA resistance before …
Support vector regression: exploiting machine learning techniques for leakage modeling
Side-channel analysis (SCA) is a serious threat to embedded cryptography. Any SCA has
two important components: leakage modeling and distinguisher. Although distinguisher has …
two important components: leakage modeling and distinguisher. Although distinguisher has …
Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations
Simulation is a very powerful tool for hardware designers. It generally allows the preliminary
evaluation of a chip's performance before its final tape out. As security against side-channel …
evaluation of a chip's performance before its final tape out. As security against side-channel …
On the relationship between correlation power analysis and the stochastic approach: an ASIC designer perspective
F De Santis, M Kasper, S Mangard, G Sigl… - … on Cryptology in India, 2013 - Springer
The design and the security verification of side-channel resistant cryptographic hardware
often represent an iterative process. This process essentially consists of a detection phase …
often represent an iterative process. This process essentially consists of a detection phase …
[PDF][PDF] Ascend: An architecture for performing secure computation on encrypted data
CW Fletcher - 2013 - Citeseer
This thesis considers encrypted computation where the user specifies encrypted inputs to an
untrusted batch program controlled by an untrusted server. In batch computation, all data …
untrusted batch program controlled by an untrusted server. In batch computation, all data …
Multivariate leakage model for improving non-profiling DPA on noisy power traces
S Hajra, D Mukhopadhyay - … 2013, Guangzhou, China, November 27-30 …, 2014 - Springer
Profiling power attacks like Template attack and Stochastic attack optimize their performance
by jointly evaluating the leakages of multiple sample points. However, such multivariate …
by jointly evaluating the leakages of multiple sample points. However, such multivariate …
A unified formalism for physical attacks
H Le Bouder, R Lashermes, Y Linge… - Cryptology ePrint …, 2014 - eprint.iacr.org
The security of cryptographic algorithms can be considered in two contexts. On the one
hand, these algorithms can be proven secure mathematically. On the other hand, physical …
hand, these algorithms can be proven secure mathematically. On the other hand, physical …
UN FORMALISME UNIFIANT LES ATTAQUES PHYSIQUES SUR CIRCUITS CRYTOGRAPHIQUES ET SON EXPLOITATION AFIN DE COMPARER ET …
H Le Bouder - 2014 - theses.hal.science
Cette thèse se situe dans la cryptanalyse physique des algorithmes de chiffrement par
blocs. Un algorithme cryptographique est conçu pour être mathématiquement robuste …
blocs. Un algorithme cryptographique est conçu pour être mathématiquement robuste …