A tutorial on physical security and side-channel attacks

F Koeune, FX Standaert - International School on Foundations of Security …, 2004 - Springer
A recent branch of cryptography focuses on the physical constraints that a real-life
cryptographic device must face, and attempts to exploit these constraints (running time …

Hardware security in IoT era: The role of measurements and instrumentation

I Tudosa, F Picariello, E Balestrieri… - 2019 II Workshop on …, 2019 - ieeexplore.ieee.org
Broadly, Internet of Things (IoT) paradigm represents an evolving technology which tries to
reach its main goal, where each and everything'(ie device) can be:(i) connected through a …

Faster addition and doubling on elliptic curves

DJ Bernstein, T Lange - Advances in Cryptology–ASIACRYPT 2007: 13th …, 2007 - Springer
Edwards recently introduced a new normal form for elliptic curves. Every elliptic curve over a
non-binary field is birationally equivalent to a curve in Edwards form over an extension of the …

Predicting secret keys via branch prediction

O Acıiçmez, ÇK Koç, JP Seifert - Topics in Cryptology–CT-RSA 2007: The …, 2006 - Springer
This paper announces a new software side-channel attack—enabled by the branch
prediction capability common to all modern high-performance CPUs. The penalty paid (extra …

Recovering human body configurations: Combining segmentation and recognition

G Mori, X Ren, AA Efros, J Malik - Proceedings of the 2004 …, 2004 - ieeexplore.ieee.org
The goal of this work is to detect a human figure image and localize his joints and limbs
along with their associated pixel masks. In this work we attempt to tackle this problem in a …

On the power of simple branch prediction analysis

O Aciiçmez, ÇK Koç, JP Seifert - … of the 2nd ACM symposium on …, 2007 - dl.acm.org
Very recently, a new software side-channel attack, called Branch Prediction Analysis (BPA)
attack, has been discovered and also demonstrated to be practically feasible on popular …

Horizontal correlation analysis on exponentiation

C Clavier, B Feix, G Gagnerot, M Roussellet… - … Conference, ICICS 2010 …, 2010 - Springer
We introduce in this paper a technique in which we apply correlation analysis using only
one execution power curve during an exponentiation to recover the whole secret exponent …

Fault attacks on secure embedded software: Threats, design, and evaluation

B Yuce, P Schaumont, M Witteman - Journal of Hardware and Systems …, 2018 - Springer
Embedded software is developed under the assumption that hardware execution is always
correct. Fault attacks break and exploit that assumption. Through the careful introduction of …

State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures

J Fan, X Guo, E De Mulder… - … oriented security and …, 2010 - ieeexplore.ieee.org
Implementations of cryptographic primitives are vulnerable to physical attacks. While the
adversary only needs to succeed in one out of many attack methods, the designers have to …

Cache-timing template attacks

BB Brumley, RM Hakala - International Conference on the Theory and …, 2009 - Springer
Cache-timing attacks are a serious threat to security-critical software. We show that the
combination of vector quantization and hidden Markov model cryptanalysis is a powerful tool …