Pseudo constant time implementations of TLS are only pseudo secure
E Ronen, KG Paterson, A Shamir - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Today, about 10% of TLS connections are still using CBC-mode cipher suites, despite a long
history of attacks and the availability of better options (eg AES-GCM). In this work, we …
history of attacks and the availability of better options (eg AES-GCM). In this work, we …
Masking proofs are tight and how to exploit it in security evaluations
V Grosso, FX Standaert - … in Cryptology–EUROCRYPT 2018: 37th Annual …, 2018 - Springer
Evaluating the security level of a leaking implementation against side-channel attacks is a
challenging task. This is especially true when countermeasures such as masking are …
challenging task. This is especially true when countermeasures such as masking are …
On the evaluation of deep learning-based side-channel analysis
Deep learning-based side-channel analysis is rapidly positioning itself as a de-facto
standard for the most powerful profiling side-channel analysis. The results from the last few …
standard for the most powerful profiling side-channel analysis. The results from the last few …
A comprehensive study of the key enumeration problem
R Villanueva-Polanco - Entropy, 2019 - mdpi.com
In this paper, we will study the key enumeration problem, which is connected to the key
recovery problem posed in the cold boot attack setting. In this setting, an attacker with …
recovery problem posed in the cold boot attack setting. In this setting, an attacker with …
Scalable key rank estimation (and key enumeration) algorithm for large keys
V Grosso - Smart Card Research and Advanced Applications: 17th …, 2019 - Springer
Abstract Evaluation of security margins after a side-channel attack is an important step of
side-channel resistance evaluation. The security margin indicates the brute force effort …
side-channel resistance evaluation. The security margin indicates the brute force effort …
Two sides of the same coin: counting and enumerating keys post side-channel attacks revisited
Motivated by the need to assess the concrete security of a device after a side channel attack,
there has been a flurry of recent work designing both key rank and key enumeration …
there has been a flurry of recent work designing both key rank and key enumeration …
Mcrank: Monte carlo key rank estimation for side-channel security evaluations
G Camurati, M Dell'Amico… - IACR Transactions on …, 2023 - research-collection.ethz.ch
Key rank estimation provides a measure of the effort that the attacker has to spend
bruteforcing the key of a cryptographic algorithm, after having gained some information from …
bruteforcing the key of a cryptographic algorithm, after having gained some information from …
A fast and accurate guessing entropy estimation algorithm for full-key recovery
Guessing entropy (GE) is a widely adopted metric that measures the average computational
cost needed for a successful side-channel analysis (SCA). However, with current estimation …
cost needed for a successful side-channel analysis (SCA). However, with current estimation …
A systematic study of the impact of graphical models on inference-based attacks on AES
Belief propagation, or the sum-product algorithm, is a powerful and well known method for
inference on probabilistic graphical models, which has been proposed for the specific use in …
inference on probabilistic graphical models, which has been proposed for the specific use in …
Quantum key search with side channel advice
Recently, a number of results have been published that show how to combine classical
cryptanalysis with quantum algorithms, thereby (potentially) achieving considerable speed …
cryptanalysis with quantum algorithms, thereby (potentially) achieving considerable speed …