Evaluation of SPN-based lightweight crypto-ciphers

L Dalmasso, F Bruguier, P Benoit, L Torres - IEEE Access, 2019 - ieeexplore.ieee.org
Lightweight cryptography has recently emerged as a strong requirement for any highly
constrained connected device; encryption/decryption processes must strike the balance …

Cryptography and Embedded Systems Security

X Hou, J Breier - Springer, 2024 - Springer
Cryptography is an indispensable tool used to protect information in computing systems.
Billions of people all over the world use it in their daily lives without even noticing there is …

ExpFault: an automated framework for exploitable fault characterization in block ciphers

S Saha, D Mukhopadhyay, P Dasgupta - IACR Transactions on …, 2018 - tches.iacr.org
Malicious exploitation of faults for extracting secrets is one of the most practical and potent
threats to modern cryptographic primitives. Interestingly, not every possible fault for a …

SITM: See-in-the-middle side-channel assisted middle round differential cryptanalysis on SPN block ciphers

S Bhasin, J Breier, X Hou, D Jap, R Poussier… - IACR Transactions on …, 2020 - tches.iacr.org
Side-channel analysis constitutes a powerful attack vector against cryptographic
implementations. Techniques such as power and electromagnetic side-channel analysis …

On side channel vulnerabilities of bit permutations in cryptographic algorithms

J Breier, D Jap, X Hou, S Bhasin - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Lightweight block ciphers rely on simple operations to allow compact implementation.
Thanks to its efficiency, bit permutation has emerged as an optimal choice for state-wise …

Side-Channel Analysis Attacks and Countermeasures

X Hou, J Breier - Cryptography and Embedded Systems Security, 2024 - Springer
Side-channel analysis attacks target cryptographic implementations passively. The attacks
exploit the possibility of the attacker observing the physical characteristics of a device that is …

Breaking redundancy-based countermeasures with random faults and power side channel

S Saha, D Jap, J Breier, S Bhasin… - 2018 Workshop on …, 2018 - ieeexplore.ieee.org
Redundancy based countermeasures against fault attacks are a popular choice in security-
critical commercial products, owing to its high fault coverage and applications to …

SBCMA: Semi-Blind Combined Middle-Round Attack on Bit-Permutation Ciphers With Application to AEAD Schemes

X Hou, J Breier, S Bhasin - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
Side-channel and fault injection attacks are well-researched topics within physical security
of cryptographic implementations. They can reduce the complexity of the key retrieval to …

Complete practical Side-Channel-assisted reverse engineering of AES-like ciphers

A Caforio, F Balli, S Banik - … Conference on Smart Card Research and …, 2021 - Springer
Public knowledge about the structure of a cryptographic system is a standard assumption in
the literature and algorithms are expected to guarantee security in a setting where only the …

DL-SITM: Deep Learning-Based See-in-the-Middle Attack on AES

T Gerlich, J Breier, P Sikora, Z Martinásek… - Cryptology ePrint …, 2024 - eprint.iacr.org
The see-in-the-middle (SITM) attack combines differential cryptanalysis and the ability to
observe differential patterns in the side-channel leakage traces to reveal the secret key of …