The side-channel metrics cheat sheet

K Papagiannopoulos, O Glamočanin… - ACM Computing …, 2023 - dl.acm.org
Side-channel attacks exploit a physical observable originating from a cryptographic device
in order to extract its secrets. Many practically relevant advances in the field of side-channel …

[HTML][HTML] A comprehensive survey on the non-invasive passive side-channel analysis

P Socha, V Miškovský, M Novotný - Sensors, 2022 - mdpi.com
Side-channel analysis has become a widely recognized threat to the security of
cryptographic implementations. Different side-channel attacks, as well as countermeasures …

Making masking security proofs concrete: or how to evaluate the security of any leaking device

A Duc, S Faust, FX Standaert - … on the Theory and Applications of …, 2015 - Springer
We investigate the relationships between theoretical studies of leaking cryptographic
devices and concrete security evaluations with standard side-channel attacks. Our …

Best information is most successful

E De Chérisey, S Guilley, O Rioul… - Cryptology ePrint …, 2019 - eprint.iacr.org
Using information-theoretic tools, this paper establishes a mathematical link between the
probability of success of a side-channel attack and the minimum number of queries to reach …

[PDF][PDF] Innovative method of the power analysis

Z Martinasek, V Zeman - Radioengineering, 2013 - radioeng.cz
This paper describes an innovative method of the power analysis which presents the typical
example of successful attacks against trusted cryptographic devices such as RFID (Radio …

NICV: normalized inter-class variance for detection of side-channel leakage

S Bhasin, JL Danger, S Guilley… - 2014 International …, 2014 - ieeexplore.ieee.org
Side-Channel Attacks (SCA) are considered a serious threat against embedded
cryptography. Therefore security critical chips must be tested for SCA resistance before …

Moments-correlating DPA

A Moradi, FX Standaert - Proceedings of the 2016 ACM Workshop on …, 2016 - dl.acm.org
We generalize correlation-enhanced power analysis collision attacks into moments-
correlating DPA. The resulting distinguisher is applicable to the profiled and non-profiled …

Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version

A Duc, S Faust, FX Standaert - Journal of Cryptology, 2019 - Springer
We investigate the relationship between theoretical studies of leaking cryptographic devices
and concrete security evaluations with standard side-channel attacks. Our contributions are …

Evolving nonlinear S-boxes with improved theoretical resilience to power attacks

A Freyre-Echevarría, I Martínez-Díaz, CML Pérez… - IEEE …, 2020 - ieeexplore.ieee.org
Substitution boxes are the main nonlinear component of block ciphers. The security of these
ciphers against linear, differential, or side-channel attacks is dependent on the design of …

Redefining the transparency order

K Chakraborty, S Sarkar, S Maitra, B Mazumdar… - Designs, codes and …, 2017 - Springer
In this paper, we consider the multi-bit Differential Power Analysis (DPA) in the Hamming
weight model. In this regard, we revisit the definition of Transparency Order (TO TO) from the …