A comprehensive study of deep learning for side-channel analysis

L Masure, C Dumas, E Prouff - IACR Transactions on Cryptographic …, 2020 - tches.iacr.org
Recently, several studies have been published on the application of deep learning to
enhance Side-Channel Attacks (SCA). These seminal works have practically validated the …

Exploring feature selection scenarios for deep learning-based side-channel analysis

G Perin, L Wu, S Picek - IACR Transactions on Cryptographic …, 2022 - research.tudelft.nl
One of the main promoted advantages of deep learning in profiling side-channel analysis is
the possibility of skip** the feature engineering process. Despite that, most recent …

Ranking loss: Maximizing the success rate in deep learning side-channel analysis

G Zaid, L Bossuet, F Dassance, A Habrard… - IACR Transactions on …, 2021 - tches.iacr.org
The side-channel community recently investigated a new approach, based on deep
learning, to significantly improve profiled attacks against embedded systems. Compared to …

Formal security proofs via Doeblin coefficients: optimal side-channel factorization from noisy leakage to random probing

J Béguinot, W Cheng, S Guilley, O Rioul - Annual International Cryptology …, 2024 - Springer
Masking is one of the most popular countermeasures to side-channel attacks, because it can
offer provable security. However, depending on the adversary's model, useful security …

Imbalanced data problems in deep learning-based side-channel attacks: Analysis and solution

A Ito, K Saito, R Ueno, N Homma - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In recent years, the threat of profiling attacks using deep learning has emerged. Successful
attacks have been demonstrated against various types of cryptographic modules. However …

On the success rate of side-channel attacks on masked implementations: information-theoretical bounds and their practical usage

A Ito, R Ueno, N Homma - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
This study derives information-theoretical bounds of the success rate (SR) of side-channel
attacks on masked implementations. We first develop a communication channel model …

Removing the field size loss from Duc et al.'s conjectured bound for masked encodings

J Béguinot, W Cheng, S Guilley, Y Liu, L Masure… - … on Constructive Side …, 2023 - Springer
Abstract At Eurocrypt 2015, Duc et al. conjectured that the success rate of a side-channel
attack targeting an intermediate computation encoded in a linear secret-sharing, aka …

Systematic study of decryption and re-encryption leakage: the case of kyber

M Azouaoui, O Bronchain, C Hoffmann… - … on Constructive Side …, 2022 - Springer
The side-channel cryptanalysis of Post-Quantum (PQ) key encapsulation schemes has been
a topic of intense activity over the last years. Many attacks have been put forward: Simple …

Prouff and Rivain's Formal Security Proof of Masking, Revisited: Tight Bounds in the Noisy Leakage Model

L Masure, FX Standaert - Annual International Cryptology Conference, 2023 - Springer
Masking is a counter-measure that can be incorporated to software and hardware
implementations of block ciphers to provably secure them against side-channel attacks. The …

Effective and efficient masking with low noise using small-mersenne-prime ciphers

L Masure, P Méaux, T Moos, FX Standaert - … International Conference on …, 2023 - Springer
Embedded devices used in security applications are natural targets for physical attacks.
Thus, enhancing their side-channel resistance is an important research challenge. A …