Evaluation of SPN-based lightweight crypto-ciphers
Lightweight cryptography has recently emerged as a strong requirement for any highly
constrained connected device; encryption/decryption processes must strike the balance …
constrained connected device; encryption/decryption processes must strike the balance …
Cryptography and Embedded Systems Security
Cryptography is an indispensable tool used to protect information in computing systems.
Billions of people all over the world use it in their daily lives without even noticing there is …
Billions of people all over the world use it in their daily lives without even noticing there is …
ExpFault: an automated framework for exploitable fault characterization in block ciphers
Malicious exploitation of faults for extracting secrets is one of the most practical and potent
threats to modern cryptographic primitives. Interestingly, not every possible fault for a …
threats to modern cryptographic primitives. Interestingly, not every possible fault for a …
SITM: See-in-the-middle side-channel assisted middle round differential cryptanalysis on SPN block ciphers
Side-channel analysis constitutes a powerful attack vector against cryptographic
implementations. Techniques such as power and electromagnetic side-channel analysis …
implementations. Techniques such as power and electromagnetic side-channel analysis …
On side channel vulnerabilities of bit permutations in cryptographic algorithms
Lightweight block ciphers rely on simple operations to allow compact implementation.
Thanks to its efficiency, bit permutation has emerged as an optimal choice for state-wise …
Thanks to its efficiency, bit permutation has emerged as an optimal choice for state-wise …
Side-Channel Analysis Attacks and Countermeasures
Side-channel analysis attacks target cryptographic implementations passively. The attacks
exploit the possibility of the attacker observing the physical characteristics of a device that is …
exploit the possibility of the attacker observing the physical characteristics of a device that is …
Breaking redundancy-based countermeasures with random faults and power side channel
Redundancy based countermeasures against fault attacks are a popular choice in security-
critical commercial products, owing to its high fault coverage and applications to …
critical commercial products, owing to its high fault coverage and applications to …
SBCMA: Semi-Blind Combined Middle-Round Attack on Bit-Permutation Ciphers With Application to AEAD Schemes
Side-channel and fault injection attacks are well-researched topics within physical security
of cryptographic implementations. They can reduce the complexity of the key retrieval to …
of cryptographic implementations. They can reduce the complexity of the key retrieval to …
Complete practical Side-Channel-assisted reverse engineering of AES-like ciphers
Public knowledge about the structure of a cryptographic system is a standard assumption in
the literature and algorithms are expected to guarantee security in a setting where only the …
the literature and algorithms are expected to guarantee security in a setting where only the …
DL-SITM: Deep Learning-Based See-in-the-Middle Attack on AES
The see-in-the-middle (SITM) attack combines differential cryptanalysis and the ability to
observe differential patterns in the side-channel leakage traces to reveal the secret key of …
observe differential patterns in the side-channel leakage traces to reveal the secret key of …