Recent advances in deep learning‐based side‐channel analysis

S **, S Kim, HS Kim, S Hong - Etri Journal, 2020 - Wiley Online Library
As side‐channel analysis and machine learning algorithms share the same objective of
classifying data, numerous studies have been proposed for adapting machine learning to …

Parallel implementations of masking schemes and the bounded moment leakage model

G Barthe, F Dupressoir, S Faust, B Grégoire… - Advances in Cryptology …, 2017 - Springer
In this paper, we provide a necessary clarification of the good security properties that can be
obtained from parallel implementations of masking schemes. For this purpose, we first argue …

Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter

O Bronchain, FX Standaert - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
We explore the concrete side-channel security provided by state-of-theart higher-order
masked software implementations of the AES and the (candidate to the NIST Lightweight …

Orthogonal direct sum masking: A smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks

J Bringer, C Carlet, H Chabanne, S Guilley… - … on Information Security …, 2014 - Springer
Secure elements, such as smartcards or trusted platform modules (TPMs), must be protected
against implementation-level attacks. Those include side-channel and fault injection attacks …

A countermeasure against statistical ineffective fault analysis

J Breier, M Khairallah, X Hou… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Current state-of-the-art countermeasures against Fault Injection Attacks (FIA) provide good
protection against analysis methods that require the differences in the correct and faulty …

There is wisdom in harnessing the strengths of your enemy: Customized encoding to thwart side-channel attacks

H Maghrebi, V Servant, J Bringer - … 2016, Bochum, Germany, March 20-23 …, 2016 - Springer
Side-channel attacks are an important concern for the security of cryptographic algorithms.
To counteract it, a recent line of research has investigated the use of software encoding …

Stochastic collision attack

N Bruneau, C Carlet, S Guilley… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
On the one hand, collision attacks have been introduced in the context of side-channel
analysis for attackers who exploit repeated code with the same data without having any …

You can detect but you cannot hide: Fault assisted side channel analysis on protected software-based block ciphers

A Papadimitriou, K Nomikos, M Psarakis… - … on Defect and Fault …, 2020 - ieeexplore.ieee.org
Cryptographic implementations are prune to Side Channel Analysis (SCA) attacks and Fault
Injection (FI) attacks at the same time. Therefore, countermeasures protecting an …

Feeding two cats with one bowl: On designing a fault and side-channel resistant software encoding scheme

J Breier, X Hou - Topics in Cryptology–CT-RSA 2017: The …, 2017 - Springer
When it comes to side-channel countermeasures, software encoding schemes are
becoming popular and provide a good level of security for general-purpose microcontrollers …

The other side of the coin: Analyzing software encoding schemes against fault injection attacks

J Breier, D Jap, S Bhasin - 2016 IEEE International Symposium …, 2016 - ieeexplore.ieee.org
The versatility and cost of embedded systems have made it ubiquitous. Such wide-
application exposes an embedded system to a variety of physical threats like side-channel …