Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    An In-Depth Security Evaluation of the Nintendo DSi Gaming Console

    The Nintendo DSi is a handheld gaming console released by Nintendo in 2008. In Nintendo’s line-up the DSi served as a successor to the DS and was later succeeded by the 3DS. The security systems of both the DS...

    pcy Sluys, Lennert Wouters in Smart Card Research and Advanced Applicati… (2024)

  2. No Access

    Chapter and Conference Paper

    Design Considerations for EM Pulse Fault Injection

    Electromagnetic-fault injection (EM-FI) setups are appealing since they can be made at a low cost, achieve relatively high spatial resolutions, and avoid the need of tampering with the PCB or packaging of the ...

    Arthur Beckers, Masahiro Kinugawa in Smart Card Research and Advanced Applicati… (2020)

  3. Chapter and Conference Paper

    Fast Leakage Assessment

    We describe a fast technique for performing the computationally heavy part of leakage assessment, in any statistical moment (or other property) of the leakage samples distributions. The proposed technique outp...

    Oscar Reparaz, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2017)

  4. Chapter and Conference Paper

    DPA, Bitslicing and Masking at 1 GHz

    We present DPA attacks on an ARM Cortex-A8 processor running at 1 GHz. This high-end processor is typically found in portable devices such as phones and tablets. In our case, the processor sits in a single boa...

    Josep Balasch, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2015)

  5. No Access

    Chapter and Conference Paper

    A Note on the Use of Margins to Compare Distinguishers

    Relative distinguishing margins are becoming a popular measure for comparing distinguishers. This paper presents some examples that show that this measure, although informative and intuitively sound, should no...

    Oscar Reparaz, Benedikt Gierlichs in Constructive Side-Channel Analysis and Sec… (2014)

  6. No Access

    Chapter and Conference Paper

    Generic DPA Attacks: Curse or Blessing?

    Generic DPA attacks, such as MIA, have been recently proposed as a method to mount DPA attacks without the need for possibly restrictive assumptions on the leakage behaviour. Previous work identified some shor...

    Oscar Reparaz, Benedikt Gierlichs in Constructive Side-Channel Analysis and Sec… (2014)

  7. No Access

    Chapter and Conference Paper

    Power Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMs

    Atmel CryptoMemory devices offer non-volatile memory with access control and authenticated encryption. They are used in commercial and military applications e.g. to prevent counterfeiting, to store secrets suc...

    Josep Balasch, Benedikt Gierlichs, Roel Verdult in Topics in Cryptology – CT-RSA 2012 (2012)

  8. No Access

    Chapter and Conference Paper

    Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output

    Implementation attacks pose a serious threat for the security of cryptographic devices and there are a multitude of countermeasures that are used to prevent them. Two countermeasures used in implementations of...

    Benedikt Gierlichs, Jörn-Marc Schmidt in Progress in Cryptology – LATINCRYPT 2012 (2012)

  9. No Access

    Chapter and Conference Paper

    Revisiting Higher-Order DPA Attacks:

    Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful approach to break protected im...

    Benedikt Gierlichs, Lejla Batina, Bart Preneel in Topics in Cryptology - CT-RSA 2010 (2010)

  10. No Access

    Chapter and Conference Paper

    Fault Analysis Study of IDEA

    We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher’s specific property to employ operations on three different algebra...

    Christophe Clavier, Benedikt Gierlichs in Topics in Cryptology – CT-RSA 2008 (2008)

  11. No Access

    Chapter and Conference Paper

    Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip

    We propose a new class of distinguishers for differential side-channel analysis based on nonparametric statistics. As an example we use Spearman’s rank correlation coefficient. We present a comparative study o...

    Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust in Information Security (2008)

  12. No Access

    Chapter and Conference Paper

    Perfect Matching Disclosure Attacks

    Traffic analysis is the best known approach to uncover relationships amongst users of anonymous communication systems, such as mix networks. Surprisingly, all previously published techniques require very speci...

    Carmela Troncoso, Benedikt Gierlichs, Bart Preneel in Privacy Enhancing Technologies (2008)

  13. Chapter and Conference Paper

    Mutual Information Analysis

    We propose a generic information-theoretic distinguisher for differential side-channel analysis. Our model of side-channel leakage is a refinement of the one given by Standaert et al. An embedded device containin...

    Benedikt Gierlichs, Lejla Batina, Pim Tuyls in Cryptographic Hardware and Embedded System… (2008)

  14. Chapter and Conference Paper

    Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration

    Dynamically reconfigurable systems are known to have many advantages such as area and power reduction. The drawbacks of these systems are the reconfiguration delay and the overhead needed to provide reconfigur...

    Nele Mentens, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2008)

  15. Chapter and Conference Paper

    DPA-Resistance Without Routing Constraints?

    MDPL is a logic style claiming to provide resistance against Differential Side Channel Analysis on power consumption measurements. In this paper we show that the power consumption of a non-linear MDPL gate can...

    Benedikt Gierlichs in Cryptographic Hardware and Embedded Systems - CHES 2007 (2007)

  16. Chapter and Conference Paper

    Templates vs. Stochastic Methods

    Template Attacks and the Stochastic Model provide advanced methods for side channel cryptanalysis that make use of ‘a-priori’ knowledge gained from a profiling step. For a systematic comparison of Template Att...

    Benedikt Gierlichs, Kerstin Lemke-Rust in Cryptographic Hardware and Embedded System… (2006)