A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Exploiting the Difference of Side-Channel Leakages
[chapter]
2012
Lecture Notes in Computer Science
In this paper, we propose a setup that improves the performance of implementation attacks by exploiting the difference of sidechannel leakages. ...
The main idea of our setup is to use two cryptographic devices and to measure the difference of their physical leakages, e.g., their power consumption. ...
number P22241-N23 (Investigation of Implementation Attacks -IIA). ...
doi:10.1007/978-3-642-29912-4_1
fatcat:n6t6fsb6nnftxjriszvvjgvv2y
Clustering Algorithms for Non-profiled Single-Execution Attacks on Exponentiations
[chapter]
2014
Lecture Notes in Computer Science
Side-channel attacks on secret exponents are typically bound to the leakage of single executions because of cryptographic protocols or side-channel countermeasures such as blinding. ...
the signal-to-noise ratio of available leakage. ...
We refer to the side-channel information about different bits which can be collected from one execution of an exponentiation as single-execution side-channel leakage. ...
doi:10.1007/978-3-319-08302-5_6
fatcat:3cgzogdss5ei5pr7eee5z2wcpi
Clustering Algorithms for Non-profiled Single-Execution Attacks on Exponentiations
[chapter]
2014
Lecture Notes in Computer Science
Side-channel attacks on secret exponents are typically bound to the leakage of single executions because of cryptographic protocols or side-channel countermeasures such as blinding. ...
the signal-to-noise ratio of available leakage. ...
We refer to the side-channel information about different bits which can be collected from one execution of an exponentiation as single-execution side-channel leakage. ...
doi:10.1007/978-3-319-14123-7_6
fatcat:sxv4eufmijg7vhyoi2um2ceobi
Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices
[chapter]
2009
Lecture Notes in Computer Science
We finally describe a new (but highly inspired from previous ones) statistical test to exploit side-channel leakages. ⋆ ...
Additionally, we suggest an informal classification of side-channel distinguishers that underlines the similarities between different attacks. ...
Side-channel adversary The present analysis aims to compare different statistical tests for side-channel attacks. But statistical tests are only a part of a side-channel adversary. ...
doi:10.1007/978-3-642-00730-9_16
fatcat:d3qjjtlqwvctpaqh7up3asegt4
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
[chapter]
2009
Lecture Notes in Computer Science
Our results exhibit that algebraic techniques lead to a new understanding of implementation weaknesses that is different than classical side-channel attacks. ...
Namely, algebraic side-channel attacks can recover the AES master key with the observation of a single encrypted plaintext and they easily deal with unknown plaintexts/ciphertexts in this context. ...
By exploiting the leakages in all the cipher rounds, algebraic side-channel attacks also get rid of the computational limitations of classical DPA in which enumerating key candidates is necessary. ...
doi:10.1007/978-3-642-04138-9_8
fatcat:nbkyzlyqfvdrxeeoyeg6s4m2sa
Introduction to Side-Channel Attacks
[chapter]
2009
Integrated Circuits and Systems
Side-channel cryptanalysis is a new research area in applied cryptography that has gained more and more interest since the midnineties. ...
It considers adversaries trying to take advantage of the physical specificities of actual cryptographic devices. ...
Finally, we list a number of countermeasures to reduce the impact of physical information leakages. 2 Basics of side-channel attacks
Origin of the leakages Side-channel attacks are closely related to ...
doi:10.1007/978-0-387-71829-3_2
fatcat:z7gvobbxwzaypk2jhhgri5jki4
Analysis and countermeasures to side-channel attacks: a hardware design perspective
2019
2019 14th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)
Second, we discuss the variations in the observability of the side-channel information leakage at post-synthesis and post-implementation levels of the FPGA hardware design flow. ...
Starting from an FPGA implementation of the open-hardware ORPSoC system-on-chip running a software version of the AES, this paper explores two implications of the side-channel information leakage that ...
Microarchitectural components inducing side-channel information leakage -To expose the side-channel information leakage caused by microarchitectural CPU modules, we employed two different sequences of ...
doi:10.1109/recosoc48741.2019.9034935
dblp:conf/recosoc/Zoni19
fatcat:m3yxtqrf2bfltnjtonbkroprzi
Non-Linear Collision Analysis
[chapter]
2014
Lecture Notes in Computer Science
Due to the advancement of chip technology, the nature of side channel leakage becomes hard to characterize with a fixed leakage model. ...
In this work, a new non-linear collision attack is proposed in the pursuit of the side channel distinguishers with minimal assumption of leakage behavior. ...
We would like to thank the anonymous reviewers for their helpful comments. ...
doi:10.1007/978-3-319-13066-8_13
fatcat:oqrgntkw5ngj5eny47rkx3kkou
Side-Channel Attacks on RISC-V Processors: Current Progress, Challenges, and Opportunities
[article]
2021
arXiv
pre-print
The focus of this paper is to analyze the hardware-exploitable side-channel attack using power consumption and software-exploitable side-channel attacks to manipulate cache. ...
In this paper, we present a brief yet comprehensive study of the security vulnerabilities in modern microprocessors with respect to side-channel attacks and their respective mitigation techniques. ...
ACKNOWLEDGMENT This work was partially supported by Doctoral College Resilient Embedded Systems which is run jointly by TU Wien's Faculty of Informatics and FH-Technikum Wien. ...
arXiv:2106.08877v1
fatcat:zdalqpzvajatjhvu4ik7ccvwky
Soft Analytical Side-Channel Attacks
[chapter]
2014
Lecture Notes in Computer Science
the optimal data complexity of algebraic side-channel attacks. ...
The resulting soft analytical side-channel attacks work under the same profiling assumptions as template attacks, and directly exploit the vectors of probabilities produced by these attacks. ...
François-Xavier Standaert is a research associate of the Belgian Fund for Scientific Research (FNRS-F.R.S.). ...
doi:10.1007/978-3-662-45611-8_15
fatcat:qnktxequ4ngh7mvl6j46mdllty
A Quantitative, Experimental Approach to Measuring Processor Side-Channel Security
2013
IEEE Micro
Side-channel exploits affect a variety of important domains. ...
Documented side-channel attacks offer existence proofs of exploitable vulnerabilities, but they should also be considered as symptoms of a deeper problem. ...
Side-channel exploits affect a variety of important domains. ...
doi:10.1109/mm.2013.23
fatcat:3l6idf5w3rbe3gg32vhiaigxfa
Side-Channel Leakage Detection with One-Way Analysis of Variance
2021
Security and Communication Networks
In accordance with the relevance between leakage points and inputs of a cryptographic algorithm, the proposed method divides side-channel samples into multiple classes and tests the difference among these ...
Side-channel analysis (SCA) is usually used for security evaluation to test the side-channel vulnerability of a cryptographic device. ...
Acknowledgments is work was supported in part by National Natural Science Foundation of China (nos. 61802186, 61472189, 61572255, and 62002167). ...
doi:10.1155/2021/6614702
fatcat:kd7n2lra2rhdpkjbeyb73ve2vq
The Temperature Side Channel and Heating Fault Attacks
[chapter]
2014
Lecture Notes in Computer Science
In this paper, we present practical results of data leakages of CMOS devices via the temperature side channel-a side channel that has been widely cited in literature but not well characterized yet. ...
Agrawal [9] who exploited the fact that PC keyboards emanate different sounds that can be recognized at a distance. Improvements of the latter attack were reported by L. Zhuan et al. [10] in 2009. ...
grant number TRP251-N23 (Realizing a Secure Internet of Things -ReSIT), and the European Cooperation in Science and Technology (COST) Action IC1204 (Trustworthy Manufacturing and Utilization of Secure ...
doi:10.1007/978-3-319-08302-5_15
fatcat:yhx5yzzb2jgappca6u7cx2nvau
The Temperature Side Channel and Heating Fault Attacks
[chapter]
2014
Lecture Notes in Computer Science
In this paper, we present practical results of data leakages of CMOS devices via the temperature side channel-a side channel that has been widely cited in literature but not well characterized yet. ...
Agrawal [9] who exploited the fact that PC keyboards emanate different sounds that can be recognized at a distance. Improvements of the latter attack were reported by L. Zhuan et al. [10] in 2009. ...
grant number TRP251-N23 (Realizing a Secure Internet of Things -ReSIT), and the European Cooperation in Science and Technology (COST) Action IC1204 (Trustworthy Manufacturing and Utilization of Secure ...
doi:10.1007/978-3-319-14123-7_15
fatcat:t3u6frhnvnda7cgdof5vptnxsa
Algebraic Side-Channel Attacks
[chapter]
2010
Lecture Notes in Computer Science
Eventually, we argue that algebraic side-channel attacks can take advantage of any kind of physical leakage, leading to a new tradeoff between the robustness and informativeness of the side-channel information ...
The proposed attacks have a number of interesting features: (1) they exploit the information leakages of all the cipher rounds, (2) in common implementation contexts (e.g. assuming a Hamming weight leakage ...
A second question is to improve and optimize the different parts of an algebraic side-channel attack. ...
doi:10.1007/978-3-642-16342-5_29
fatcat:irtzopceczdh7gbrt7zvjd52g4
« Previous
Showing results 1 — 15 out of 33,629 results