Breaking cryptographic implementations using deep learning techniques
H Maghrebi, T Portigliatti, E Prouff - Security, Privacy, and Applied …, 2016 - Springer
Template attack is the most common and powerful profiled side channel attack. It relies on a
realistic assumption regarding the noise of the device under attack: the probability density …
realistic assumption regarding the noise of the device under attack: the probability density …
A unified framework for the analysis of side-channel key recovery attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been
a long standing open question, limiting further developments in the field. Motivated by this …
a long standing open question, limiting further developments in the field. Motivated by this …
The side-channel metrics cheat sheet
Side-channel attacks exploit a physical observable originating from a cryptographic device
in order to extract its secrets. Many practically relevant advances in the field of side-channel …
in order to extract its secrets. Many practically relevant advances in the field of side-channel …
A side-channel attack on a masked IND-CCA secure saber KEM implementation
In this paper, we present a side-channel attack on a first-order masked implementation of
IND-CCA secure Saber KEM. We show how to recover both the session key and the long …
IND-CCA secure Saber KEM. We show how to recover both the session key and the long …
Methodology for efficient CNN architectures in profiling attacks
The side-channel community recently investigated a new approach, based on deep
learning, to significantly improve profiled attacks against embedded systems. Previous …
learning, to significantly improve profiled attacks against embedded systems. Previous …
I choose you: Automated hyperparameter tuning for deep learning-based side-channel analysis
Today, the deep learning-based side-channel analysis represents a widely researched
topic, with numerous results indicating the advantages of such an approach. Indeed …
topic, with numerous results indicating the advantages of such an approach. Indeed …
Statistical analysis of second order differential power analysis
Second order Differential Power Analysis (2O-DPA) is a powerful side-channel attack that
allows an attacker to bypass the widely used masking countermeasure. To thwart 2O-DPA …
allows an attacker to bypass the widely used masking countermeasure. To thwart 2O-DPA …
Efficient template attacks
Template attacks remain a powerful side-channel technique to eavesdrop on tamper-
resistant hardware. They model the probability distribution of leaking signals and noise to …
resistant hardware. They model the probability distribution of leaking signals and noise to …
Recent advances in deep learning‐based side‐channel analysis
As side‐channel analysis and machine learning algorithms share the same objective of
classifying data, numerous studies have been proposed for adapting machine learning to …
classifying data, numerous studies have been proposed for adapting machine learning to …
Making masking security proofs concrete: or how to evaluate the security of any leaking device
We investigate the relationships between theoretical studies of leaking cryptographic
devices and concrete security evaluations with standard side-channel attacks. Our …
devices and concrete security evaluations with standard side-channel attacks. Our …