Breaking cryptographic implementations using deep learning techniques

H Maghrebi, T Portigliatti, E Prouff - Security, Privacy, and Applied …, 2016 - Springer
Template attack is the most common and powerful profiled side channel attack. It relies on a
realistic assumption regarding the noise of the device under attack: the probability density …

A unified framework for the analysis of side-channel key recovery attacks

FX Standaert, TG Malkin, M Yung - … on the Theory and Applications of …, 2009 - Springer
The fair evaluation and comparison of side-channel attacks and countermeasures has been
a long standing open question, limiting further developments in the field. Motivated by this …

The side-channel metrics cheat sheet

K Papagiannopoulos, O Glamočanin… - ACM Computing …, 2023 - dl.acm.org
Side-channel attacks exploit a physical observable originating from a cryptographic device
in order to extract its secrets. Many practically relevant advances in the field of side-channel …

A side-channel attack on a masked IND-CCA secure saber KEM implementation

K Ngo, E Dubrova, Q Guo, T Johansson - IACR Transactions on …, 2021 - tches.iacr.org
In this paper, we present a side-channel attack on a first-order masked implementation of
IND-CCA secure Saber KEM. We show how to recover both the session key and the long …

Methodology for efficient CNN architectures in profiling attacks

G Zaid, L Bossuet, A Habrard, A Venelli - IACR Transactions on …, 2020 - tches.iacr.org
The side-channel community recently investigated a new approach, based on deep
learning, to significantly improve profiled attacks against embedded systems. Previous …

I choose you: Automated hyperparameter tuning for deep learning-based side-channel analysis

L Wu, G Perin, S Picek - IEEE Transactions on Emerging …, 2022 - ieeexplore.ieee.org
Today, the deep learning-based side-channel analysis represents a widely researched
topic, with numerous results indicating the advantages of such an approach. Indeed …

Statistical analysis of second order differential power analysis

E Prouff, M Rivain, R Bevan - IEEE Transactions on computers, 2009 - ieeexplore.ieee.org
Second order Differential Power Analysis (2O-DPA) is a powerful side-channel attack that
allows an attacker to bypass the widely used masking countermeasure. To thwart 2O-DPA …

Efficient template attacks

O Choudary, MG Kuhn - Smart Card Research and Advanced Applications …, 2014 - Springer
Template attacks remain a powerful side-channel technique to eavesdrop on tamper-
resistant hardware. They model the probability distribution of leaking signals and noise to …

Recent advances in deep learning‐based side‐channel analysis

S **, S Kim, HS Kim, S Hong - Etri Journal, 2020 - Wiley Online Library
As side‐channel analysis and machine learning algorithms share the same objective of
classifying data, numerous studies have been proposed for adapting machine learning to …

Making masking security proofs concrete: or how to evaluate the security of any leaking device

A Duc, S Faust, FX Standaert - … on the Theory and Applications of …, 2015 - Springer
We investigate the relationships between theoretical studies of leaking cryptographic
devices and concrete security evaluations with standard side-channel attacks. Our …