Skip to main content

and
  1. Chapter and Conference Paper

    Differential Cluster Analysis

    We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions and it combines features from previousl...

    Lejla Batina, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2009)

  2. Chapter and Conference Paper

    To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order

    We present a novel combined attack against ECC implementations that exploits specially crafted, but valid input points. The core idea is that after fault injection, these points turn into points of very low or...

    Junfeng Fan, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2011)

  3. Chapter and Conference Paper

    Selecting Time Samples for Multivariate DPA Attacks

    Masking on the algorithm level, i.e. concealing all sensitive intermediate values with random data, is a popular countermeasure against DPA attacks. A properly implemented masking scheme forces an attacker to ...

    Oscar Reparaz, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2012)