Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing

YB Zhou, DG Feng - Cryptology ePrint Archive, 2005‏ - eprint.iacr.org
Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic
implementations, and their targets range from primitives, protocols, modules, and devices to …

A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics

A Sayakkara, NA Le-Khac, M Scanlon - Digital Investigation, 2019‏ - Elsevier
The increasing prevalence of Internet of Things (IoT) devices has made it inevitable that their
pertinence to digital forensic investigations will increase into the foreseeable future. These …

[PDF][PDF] A testing methodology for side-channel resistance validation

BJ Gilbert Goodwill, J Jaffe, P Rohatgi - NIST non-invasive attack …, 2011‏ - rambus.com
The goal of a side-channel resistance validation program is to assess whether a
cryptographic module utilizing sidechannel analysis countermeasures can provide …

Pushing the limits: A very compact and a threshold implementation of AES

A Moradi, A Poschmann, S Ling, C Paar… - Advances in Cryptology …, 2011‏ - Springer
Our contribution is twofold: first we describe a very compact hardware implementation of
AES-128, which requires only 2400 GE. This is to the best of our knowledge the smallest …

Gini-impurity index analysis

Y Yuan, L Wu, X Zhang - IEEE Transactions on Information …, 2021‏ - ieeexplore.ieee.org
In the past few decades, DPA-based side-channel attack strategies, such as DPA and CPA,
have shown strong ability to analyze the security of the cryptographic implementations …

A stochastic model for differential side channel cryptanalysis

W Schindler, K Lemke, C Paar - … and Embedded Systems–CHES 2005: 7th …, 2005‏ - Springer
This contribution presents a new approach to optimize the efficiency of differential side
channel cryptanalysis against block ciphers by advanced stochastic methods. We …

Simultaneous hardcore bits and cryptography against memory attacks

A Akavia, S Goldwasser, V Vaikuntanathan - Theory of cryptography …, 2009‏ - Springer
This paper considers two questions in cryptography. Cryptography Secure Against Memory
Attacks. A particularly devastating side-channel attack against cryptosystems, termed the …

Introduction to side-channel attacks

FX Standaert - Secure integrated circuits and systems, 2010‏ - Springer
Side-channel cryptanalysis is a new research area in applied cryptography that has gained
more and more interest since the mid-nineties. It considers adversaries trying to take …

Compromising emanations: eavesdrop** risks of computer displays

MG Kuhn - 2003‏ - cl.cam.ac.uk
Electronic equipment can emit unintentional signals from which eavesdroppers may
reconstruct processed data at some distance. This has been a concern for military hardware …

Diffuzz: differential fuzzing for side-channel analysis

S Nilizadeh, Y Noller… - 2019 IEEE/ACM 41st …, 2019‏ - ieeexplore.ieee.org
Side-channel attacks allow an adversary to uncover secret program data by observing the
behavior of a program with respect to a resource, such as execution time, consumed …