Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis

J Kim, S Picek, A Heuser, S Bhasin… - IACR Transactions on …, 2019 - tches.iacr.org
Profiled side-channel analysis based on deep learning, and more precisely Convolutional
Neural Networks, is a paradigm showing significant potential. The results, although scarce …

A comprehensive study of deep learning for side-channel analysis

L Masure, C Dumas, E Prouff - IACR Transactions on Cryptographic …, 2020 - metalla.org
Recently, several studies have been published on the application of deep learning to
enhance Side-Channel Attacks (SCA). These seminal works have practically validated the …

On the performance of convolutional neural networks for side-channel analysis

S Picek, IP Samiotis, J Kim, A Heuser, S Bhasin… - Security, Privacy, and …, 2018 - Springer
In this work, we ask a question whether Convolutional Neural Networks are more suitable for
side-channel attacks than some other machine learning techniques and if yes, in what …

Best information is most successful

E De Chérisey, S Guilley, O Rioul… - Cryptology ePrint …, 2019 - eprint.iacr.org
Using information-theoretic tools, this paper establishes a mathematical link between the
probability of success of a side-channel attack and the minimum number of queries to reach …

Multiple-valued plaintext-checking side-channel attacks on post-quantum KEMs

Y Tanaka, R Ueno, K Xagawa, A Ito… - IACR Transactions on …, 2023 - tches.iacr.org
In this paper, we present a side-channel analysis (SCA) on key encapsulation mechanisms
(KEMs) based on the Fujisaki–Okamoto (FO) transformation and its variants. Many post …

Ranking loss: Maximizing the success rate in deep learning side-channel analysis

G Zaid, L Bossuet, F Dassance, A Habrard… - IACR Transactions on …, 2021 - tches.iacr.org
The side-channel community recently investigated a new approach, based on deep
learning, to significantly improve profiled attacks against embedded systems. Compared to …

Side-channel analysis against ANSSI's protected AES implementation on ARM: end-to-end attacks with multi-task learning

L Masure, R Strullu - Journal of Cryptographic Engineering, 2023 - Springer
In 2019, ANSSI released a protected software implementation of AES running on an STM32
platform with ARM Cortex-M architecture, publicly available on Github. The release of the …

On the success rate of side-channel attacks on masked implementations: information-theoretical bounds and their practical usage

A Ito, R Ueno, N Homma - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
This study derives information-theoretical bounds of the success rate (SR) of side-channel
attacks on masked implementations. We first develop a communication channel model …

[PDF][PDF] 侧信道攻击与防御技术研究进展

王永娟, 樊昊鹏, 代政一, 袁庆军, 王相宾 - 计算机学报, 2023 - 159.226.43.17
摘要侧信道攻击利用密码实现的物理泄露而不是理论弱点来恢复密钥, 对密码系统的安全实现有
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …

Perceived information revisited: New metrics to evaluate success rate of side-channel attacks

A Ito, R Ueno, N Homma - IACR Transactions on Cryptographic …, 2022 - tches.iacr.org
In this study, we present new analytical metrics for evaluating the performance of side-
channel attacks (SCAs) by revisiting the perceived information (PI), which is defined using …