A comprehensive study of deep learning for side-channel analysis

L Masure, C Dumas, E Prouff - IACR Transactions on Cryptographic …, 2020‏ - metalla.org
Recently, several studies have been published on the application of deep learning to
enhance Side-Channel Attacks (SCA). These seminal works have practically validated the …

Exploring feature selection scenarios for deep learning-based side-channel analysis

G Perin, L Wu, S Picek - IACR Transactions on …, 2022‏ - philosophymindscience.org
One of the main promoted advantages of deep learning in profiling sidechannel analysis is
the possibility of skip** the feature engineering process. Despite that, most recent …

Ranking loss: Maximizing the success rate in deep learning side-channel analysis

G Zaid, L Bossuet, F Dassance, A Habrard… - IACR Transactions on …, 2021‏ - tches.iacr.org
The side-channel community recently investigated a new approach, based on deep
learning, to significantly improve profiled attacks against embedded systems. Compared to …

Removing the field size loss from Duc et al.'s conjectured bound for masked encodings

J Béguinot, W Cheng, S Guilley, Y Liu, L Masure… - … on Constructive Side …, 2023‏ - Springer
Abstract At Eurocrypt 2015, Duc et al. conjectured that the success rate of a side-channel
attack targeting an intermediate computation encoded in a linear secret-sharing, aka …

Imbalanced data problems in deep learning-based side-channel attacks: Analysis and solution

A Ito, K Saito, R Ueno, N Homma - IEEE Transactions on …, 2021‏ - ieeexplore.ieee.org
In recent years, the threat of profiling attacks using deep learning has emerged. Successful
attacks have been demonstrated against various types of cryptographic modules. However …

On the success rate of side-channel attacks on masked implementations: information-theoretical bounds and their practical usage

A Ito, R Ueno, N Homma - Proceedings of the 2022 ACM SIGSAC …, 2022‏ - dl.acm.org
This study derives information-theoretical bounds of the success rate (SR) of side-channel
attacks on masked implementations. We first develop a communication channel model …

Formal security proofs via Doeblin coefficients: optimal side-channel factorization from noisy leakage to random probing

J Béguinot, W Cheng, S Guilley, O Rioul - Annual International Cryptology …, 2024‏ - Springer
Masking is one of the most popular countermeasures to side-channel attacks, because it can
offer provable security. However, depending on the adversary's model, useful security …

Prouff and Rivain's formal security proof of masking, revisited: Tight bounds in the noisy leakage model

L Masure, FX Standaert - Annual International Cryptology Conference, 2023‏ - Springer
Masking is a counter-measure that can be incorporated to software and hardware
implementations of block ciphers to provably secure them against side-channel attacks. The …

Systematic study of decryption and re-encryption leakage: The case of kyber

M Azouaoui, O Bronchain, C Hoffmann… - … on Constructive Side …, 2022‏ - Springer
The side-channel cryptanalysis of Post-Quantum (PQ) key encapsulation schemes has been
a topic of intense activity over the last years. Many attacks have been put forward: Simple …

Perceived information revisited: New metrics to evaluate success rate of side-channel attacks

A Ito, R Ueno, N Homma - IACR Transactions on Cryptographic …, 2022‏ - tches.iacr.org
In this study, we present new analytical metrics for evaluating the performance of side-
channel attacks (SCAs) by revisiting the perceived information (PI), which is defined using …