Results 1 to 10 of about 373,725 (99)
Weakly Profiling Side-channel Analysis [PDF]
Profiling side-channel analysis, recognized for its robust attack performance in worst-case scenarios, necessitates adversaries to have a cloned device for profiling measurements and secret information for data labeling. On the other hand, nonprofiling attacks eschew these requirements by trying all key guesses.
Wu, L., Perin, G., Picek, S.
openaire +4 more sources
Side-channel analysis of SEcube™ platform
Cryptography provides techniques to cypher and de-cypher sensitive information through a token called key in order to store and transmit it across insecure networks. The goal of cryptography is to protect information from potential attackers and to enable access to authorized users only.
Bollo, Matteo +3 more
openaire +2 more sources
Symbolic Analysis of Higher-Order Side Channel Countermeasures [PDF]
In this paper, we deal with the problem of efficiently assessing the higher order vulnerability of a hardware cryptographic circuit. Our main concern is to provide methods that allow a circuit designer to detect early in the design cycle if the implementation of a Boolean-additive masking countermeasure does not hold up to the required protection order.
Bisi E, Melzani F, Zaccaria V
openaire +2 more sources
Improving Side-Channel Analysis Through Semi-supervised Learning [PDF]
The profiled side-channel analysis represents the most powerful category of side-channel attacks. In this context, the security evaluator (i.e., attacker) gains access to a profiling device to build a precise model which is used to attack another device in the attacking phase.
Picek, Stjepan +4 more
openaire +3 more sources
On XTR and Side-Channel Analysis [PDF]
Over the past few years, there has been a large volume of work on both attacking elliptic curve cryptosystems (ECC) using side-channel analysis and the development of related defence methods. Lenstra and Verheul recently introduced XTR, a cryptosystem that can compete with ECC in terms of processing and bandwidth requirements. These properties make XTR
Page, Daniel, Stam, Martijn
openaire +1 more source
Comparison between Side-Channel Analysis Distinguishers [PDF]
Side-channel analyses allow to extract keys from devices whatever their length. They rely on tools called "distinguishers". In this paper, we intend to compare two generic distinguishers per se: we provide a characterization environment where all the implementation details are equal, hence a fair comparison. In the field of distinguishers that use a
Houssem Maghrebi +3 more
openaire +1 more source
Polynomial Evaluation and Side Channel Analysis [PDF]
Side Channel Analysis (SCA) is a class of attacks that exploits leakage of information from a cryptographic implementation during execution. To thwart it, masking is a common countermeasure. The principle is to randomly split every sensitive intermediate variable occurring in the computation into several shares and the number of shares, called the ...
Carlet, Claude, Prouff, Emmanuel
openaire +3 more sources
Side channel analysis based on feature fusion network. [PDF]
Ni F, Wang J, Tang J, Yu W, Xu R.
europepmc +1 more source
Hybrid Threshold Denoising Framework Using Singular Value Decomposition for Side-Channel Analysis Preprocessing. [PDF]
Wang Y +7 more
europepmc +1 more source
A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis. [PDF]
Socha P, Miškovský V, Novotný M.
europepmc +1 more source

