Non-profiled deep learning-based side-channel attacks with sensitivity analysis

B Timon - IACR Transactions on Cryptographic Hardware and …, 2019 - tosc.iacr.org
Deep Learning has recently been introduced as a new alternative to perform Side-Channel
analysis [MPP16]. Until now, studies have been focused on applying Deep Learning …

Introduction to differential power analysis

P Kocher, J Jaffe, B Jun, P Rohatgi - Journal of Cryptographic Engineering, 2011 - Springer
The power consumed by a circuit varies according to the activity of its individual transistors
and other components. As a result, measurements of the power used by actual computers or …

Threshold implementations against side-channel attacks and glitches

S Nikova, C Rechberger, V Rijmen - International conference on …, 2006 - Springer
Implementations of cryptographic algorithms are vulnerable to side-channel attacks.
Masking techniques are employed to counter side-channel attacks that are based on …

Statistical analysis of second order differential power analysis

E Prouff, M Rivain, R Bevan - IEEE Transactions on computers, 2009 - ieeexplore.ieee.org
Second order Differential Power Analysis (2O-DPA) is a powerful side-channel attack that
allows an attacker to bypass the widely used masking countermeasure. To thwart 2O-DPA …

An AES smart card implementation resistant to power analysis attacks

C Herbst, E Oswald, S Mangard - International conference on applied …, 2006 - Springer
In this article we describe an efficient AES software implementation that is well suited for 8-
bit smart cards and resistant against power analysis attacks. Our implementation masks the …

An overview of side channel analysis attacks

TH Le, C Canovas, J Clédiere - … of the 2008 ACM symposium on …, 2008 - dl.acm.org
During the last ten years, power analysis attacks have been widely developed under many
forms. They analyze the relation between the power consumption or electromagnetic …

Information leaks without memory disclosures: Remote side channel attacks on diversified code

J Seibert, H Okhravi, E Söderström - Proceedings of the 2014 ACM …, 2014 - dl.acm.org
Code diversification has been proposed as a technique to mitigate code reuse attacks,
which have recently become the predominant way for attackers to exploit memory corruption …

Higher order masking of the AES

K Schramm, C Paar - Topics in Cryptology–CT-RSA 2006: The …, 2006 - Springer
The development of masking schemes to secure AES implementations against side channel
attacks is a topic of ongoing research. Many different approaches focus on the AES S-box …

The world is not enough: Another look on second-order DPA

FX Standaert, N Veyrat-Charvillon, E Oswald… - Advances in Cryptology …, 2010 - Springer
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called)
standard univariate side-channel attacks using a distance-of-means test, correlation …

Practical second-order DPA attacks for masked smart card implementations of block ciphers

E Oswald, S Mangard, C Herbst, S Tillich - Cryptographers' Track at the …, 2006 - Springer
In this article we describe an improved concept for second-order differential-power analysis
(DPA) attacks on masked smart card implementations of block ciphers. Our concept allows …