Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Does Coupling Affect the Security of Masked Implementations?

    Masking schemes achieve provable security against side-channel analysis by using secret sharing to decorrelate key-dependent intermediate values of the cryptographic algorithm and side-channel information. Mas...

    Thomas De Cnudde, Begül Bilgin in Constructive Side-Channel Analysis and Sec… (2017)

  2. No Access

    Chapter and Conference Paper

    Design and Implementation of a Waveform-Matching Based Triggering System

    Implementation attacks such as side channel attacks and fault attacks require triggering mechanisms to activate the acquisition device or fault injection equipment. Most academic works work with a very simple ...

    Arthur Beckers, Josep Balasch in Constructive Side-Channel Analysis and Sec… (2016)

  3. Chapter and Conference Paper

    Theory and Practice of a Leakage Resilient Masking Scheme

    A recent trend in cryptography is to formally prove the leakage resilience of cryptographic implementations – that is, one formally shows that a scheme remains provably secure even in the presence of side channel...

    Josep Balasch, Sebastian Faust in Advances in Cryptology – ASIACRYPT 2012 (2012)

  4. Chapter and Conference Paper

    The World Is Not Enough: Another Look on Second-Order DPA

    In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysis and Gaussian templates are ess...

    François-Xavier Standaert in Advances in Cryptology - ASIACRYPT 2010 (2010)

  5. No Access

    Chapter and Conference Paper

    Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices

    Given a cryptographic device leaking side-channel information, different distinguishers can be considered to turn this information into a successful key recovery. Such proposals include e.g. Kocher’s original DPA...

    François-Xavier Standaert in Information Security and Cryptology – ICIS… (2009)

  6. No Access

    Chapter and Conference Paper

    Fault Analysis Study of IDEA

    We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher’s specific property to employ operations on three different algebra...

    Christophe Clavier, Benedikt Gierlichs in Topics in Cryptology – CT-RSA 2008 (2008)