Recent advances in deep learning‐based side‐channel analysis
As side‐channel analysis and machine learning algorithms share the same objective of
classifying data, numerous studies have been proposed for adapting machine learning to …
classifying data, numerous studies have been proposed for adapting machine learning to …
Parallel implementations of masking schemes and the bounded moment leakage model
In this paper, we provide a necessary clarification of the good security properties that can be
obtained from parallel implementations of masking schemes. For this purpose, we first argue …
obtained from parallel implementations of masking schemes. For this purpose, we first argue …
Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter
We explore the concrete side-channel security provided by state-of-theart higher-order
masked software implementations of the AES and the (candidate to the NIST Lightweight …
masked software implementations of the AES and the (candidate to the NIST Lightweight …
Orthogonal direct sum masking: A smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks
Secure elements, such as smartcards or trusted platform modules (TPMs), must be protected
against implementation-level attacks. Those include side-channel and fault injection attacks …
against implementation-level attacks. Those include side-channel and fault injection attacks …
A countermeasure against statistical ineffective fault analysis
Current state-of-the-art countermeasures against Fault Injection Attacks (FIA) provide good
protection against analysis methods that require the differences in the correct and faulty …
protection against analysis methods that require the differences in the correct and faulty …
There is wisdom in harnessing the strengths of your enemy: Customized encoding to thwart side-channel attacks
H Maghrebi, V Servant, J Bringer - … 2016, Bochum, Germany, March 20-23 …, 2016 - Springer
Side-channel attacks are an important concern for the security of cryptographic algorithms.
To counteract it, a recent line of research has investigated the use of software encoding …
To counteract it, a recent line of research has investigated the use of software encoding …
Stochastic collision attack
On the one hand, collision attacks have been introduced in the context of side-channel
analysis for attackers who exploit repeated code with the same data without having any …
analysis for attackers who exploit repeated code with the same data without having any …
You can detect but you cannot hide: Fault assisted side channel analysis on protected software-based block ciphers
Cryptographic implementations are prune to Side Channel Analysis (SCA) attacks and Fault
Injection (FI) attacks at the same time. Therefore, countermeasures protecting an …
Injection (FI) attacks at the same time. Therefore, countermeasures protecting an …
Feeding two cats with one bowl: On designing a fault and side-channel resistant software encoding scheme
When it comes to side-channel countermeasures, software encoding schemes are
becoming popular and provide a good level of security for general-purpose microcontrollers …
becoming popular and provide a good level of security for general-purpose microcontrollers …
The other side of the coin: Analyzing software encoding schemes against fault injection attacks
The versatility and cost of embedded systems have made it ubiquitous. Such wide-
application exposes an embedded system to a variety of physical threats like side-channel …
application exposes an embedded system to a variety of physical threats like side-channel …