-
Chapter and Conference Paper
Design Considerations for EM Pulse Fault Injection
Electromagnetic-fault injection (EM-FI) setups are appealing since they can be made at a low cost, achieve relatively high spatial resolutions, and avoid the need of tampering with the PCB or packaging of the ...
-
Chapter and Conference Paper
A Note on the Use of Margins to Compare Distinguishers
Relative distinguishing margins are becoming a popular measure for comparing distinguishers. This paper presents some examples that show that this measure, although informative and intuitively sound, should no...
-
Chapter and Conference Paper
Generic DPA Attacks: Curse or Blessing?
Generic DPA attacks, such as MIA, have been recently proposed as a method to mount DPA attacks without the need for possibly restrictive assumptions on the leakage behaviour. Previous work identified some shor...
-
Chapter and Conference Paper
Power Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMs
Atmel CryptoMemory devices offer non-volatile memory with access control and authenticated encryption. They are used in commercial and military applications e.g. to prevent counterfeiting, to store secrets suc...
-
Chapter and Conference Paper
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output
Implementation attacks pose a serious threat for the security of cryptographic devices and there are a multitude of countermeasures that are used to prevent them. Two countermeasures used in implementations of...
-
Chapter and Conference Paper
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful approach to break protected im...
-
Chapter and Conference Paper
Fault Analysis Study of IDEA
We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher’s specific property to employ operations on three different algebra...
-
Chapter and Conference Paper
Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip
We propose a new class of distinguishers for differential side-channel analysis based on nonparametric statistics. As an example we use Spearman’s rank correlation coefficient. We present a comparative study o...
-
Chapter and Conference Paper
Perfect Matching Disclosure Attacks
Traffic analysis is the best known approach to uncover relationships amongst users of anonymous communication systems, such as mix networks. Surprisingly, all previously published techniques require very speci...
-
Chapter and Conference Paper
Mutual Information Analysis
We propose a generic information-theoretic distinguisher for differential side-channel analysis. Our model of side-channel leakage is a refinement of the one given by Standaert et al. An embedded device containin...
-
Chapter and Conference Paper
Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration
Dynamically reconfigurable systems are known to have many advantages such as area and power reduction. The drawbacks of these systems are the reconfiguration delay and the overhead needed to provide reconfigur...