Algebraic side channel attack on trivium and grain ciphers

AR Kazmi, M Afzal, MF Amjad, H Abbas, X Yang - IEEE Access, 2017 - ieeexplore.ieee.org
Solving a system of multivariate quadratic equations obtained through algebraic
cryptanalysis is a nondeterministic polynomial time-complete problem. Owing to the trend of …

Feature extraction for side-channel attacks

E Cagli - 2018 - theses.hal.science
Cryptographic integrated circuits may be vulnerable to attacks based on the observation of
information leakages conducted during the cryptographic algorithms' executions, the so …

A new framework for constraint-based probabilistic template side channel attacks

Y Oren, O Weisse, A Wool - … and Embedded Systems–CHES 2014: 16th …, 2014 - Springer
The use of constraint solvers, such as SAT-or Pseudo-Boolean-solvers, allows the extraction
of the secret key from one or two side-channel traces. However, to use such a solver the …

Side-channel cryptographic attacks using pseudo-boolean optimization

Y Oren, A Wool - Constraints, 2016 - Springer
Symmetric block ciphers, such as the Advanced Encryption Standard (AES), are
deterministic algorithms which transform plaintexts to ciphertexts using a secret key. These …

Combining algebraic and side channel attacks on stream ciphers

AR Kazmi, M Afzal, MF Amjad… - 2017 International …, 2017 - ieeexplore.ieee.org
A cryptanalysis technique can be termed successful if its complexity is better than brute force
attack, even though it may not be practically feasible due to high complexity. However, it is a …

Analysis of Cryptographic Primitives in Emerging Environment

SM Ramesh - 2024 - search.proquest.com
This dissertation explores the field of cryptanalysis, with a strong emphasis on enhancing
the security of symmetric block ciphers by addressing side-channel vulnerabilities. The …

A new efficient interesting points enhanced electromagnetic attack on AT89S52

C Ou, Z Wang, D Sun, X Zhou… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Electromagnetic attacks are non-invasive attacks and pose serious threats to the security of
cryptographic devices. However, its environment is complex and the noise on …

Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling

H Hayoon, Y Oren - … Symposium on Cyber Security, Cryptology, and …, 2022 - Springer
Template attacks are one of the most powerful classes of side-channel attacks. Template
attacks begin with an offline step, in which the side-channel traces are profiled, and …

Power Analysis Template Attacks on AES-128 Hardware Implementations and Protection Against Them

M Graivoronskyi, A Dehtyariov - Theoretical and Applied …, 2023 - tacs.ipt.kpi.ua
The purpose of this work is to research AES-128 power analysis template attack and
propose a practical way to mitigate such kind of side-channel attacks. The research includes …

Power Analysis Template Attacks on AES-128 Hardware Implementations and Protection Against Them

A Dehtyariov, M Graivoronskyi - 2023 - ela.kpi.ua
Анотація The purpose of this work is to research AES-128 power analysis template attack
and propose a practical way to mitigate such kind of side-channel attacks. The research …