Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    An In-Depth Security Evaluation of the Nintendo DSi Gaming Console

    The Nintendo DSi is a handheld gaming console released by Nintendo in 2008. In Nintendo’s line-up the DSi served as a successor to the DS and was later succeeded by the 3DS. The security systems of both the DS...

    pcy Sluys, Lennert Wouters in Smart Card Research and Advanced Applicati… (2024)

  2. No Access

    Chapter and Conference Paper

    Design Considerations for EM Pulse Fault Injection

    Electromagnetic-fault injection (EM-FI) setups are appealing since they can be made at a low cost, achieve relatively high spatial resolutions, and avoid the need of tampering with the PCB or packaging of the ...

    Arthur Beckers, Masahiro Kinugawa in Smart Card Research and Advanced Applicati… (2020)

  3. No Access

    Chapter and Conference Paper

    An In-Depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P

    Laser fault injection is a complex, physical process with many parameters that influence the success of the injection. Some parameters are difficult to control. While many works have established that focused lase...

    Dilip S. V. Kumar, Arthur Beckers in Smart Card Research and Advanced Applicati… (2019)

  4. No Access

    Chapter and Conference Paper

    A First-Order Chosen-Plaintext DPA Attack on the Third Round of DES

    DPA attacks usually exhibit a “divide-and-conquer” property: the adversary needs to enumerate only a small space of the key (a key sub-space) when performing the DPA attack. This is achieved trivially in the o...

    Oscar Reparaz, Benedikt Gierlichs in Smart Card Research and Advanced Applications (2018)

  5. No Access

    Chapter and Conference Paper

    Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers

    We present a fault analysis study of the ChaCha and Salsa families of stream ciphers. We first show that attacks like differential fault analysis that are common in the block cipher setting are not applicable ...

    Arthur Beckers, Benedikt Gierlichs in Smart Card Research and Advanced Applicati… (2018)

  6. Chapter and Conference Paper

    Consolidating Inner Product Masking

    Masking schemes are a prominent countermeasure to defeat power analysis attacks. One of their core ingredients is the encoding function. Due to its simplicity and comparably low complexity overheads, many mask...

    Josep Balasch, Sebastian Faust in Advances in Cryptology – ASIACRYPT 2017 (2017)

  7. Chapter and Conference Paper

    Fast Leakage Assessment

    We describe a fast technique for performing the computationally heavy part of leakage assessment, in any statistical moment (or other property) of the leakage samples distributions. The proposed technique outp...

    Oscar Reparaz, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2017)

  8. No Access

    Chapter and Conference Paper

    Does Coupling Affect the Security of Masked Implementations?

    Masking schemes achieve provable security against side-channel analysis by using secret sharing to decorrelate key-dependent intermediate values of the cryptographic algorithm and side-channel information. Mas...

    Thomas De Cnudde, Begül Bilgin in Constructive Side-Channel Analysis and Sec… (2017)

  9. No Access

    Chapter and Conference Paper

    Design and Implementation of a Waveform-Matching Based Triggering System

    Implementation attacks such as side channel attacks and fault attacks require triggering mechanisms to activate the acquisition device or fault injection equipment. Most academic works work with a very simple ...

    Arthur Beckers, Josep Balasch in Constructive Side-Channel Analysis and Sec… (2016)

  10. Chapter and Conference Paper

    Consolidating Masking Schemes

    In this paper we investigate relations between several masking schemes. We show that the Ishai–Sahai–Wagner private circuits construction is closely related to Threshold Implementations and the Trichina gate. ...

    Oscar Reparaz, Begül Bilgin, Svetla Nikova in Advances in Cryptology -- CRYPTO 2015 (2015)

  11. Chapter and Conference Paper

    DPA, Bitslicing and Masking at 1 GHz

    We present DPA attacks on an ARM Cortex-A8 processor running at 1 GHz. This high-end processor is typically found in portable devices such as phones and tablets. In our case, the processor sits in a single boa...

    Josep Balasch, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2015)

  12. No Access

    Chapter and Conference Paper

    On the Cost of Lazy Engineering for Masked Software Implementations

    Masking is one of the most popular countermeasures to mitigate side-channel analysis. Yet, its deployment in actual cryptographic devices is well known to be challenging, since designers have to ensure that th...

    Josep Balasch, Benedikt Gierlichs in Smart Card Research and Advanced Applicati… (2015)

  13. Chapter and Conference Paper

    Inner Product Masking Revisited

    Masking is a popular countermeasure against side channel attacks. Many practical works use Boolean masking because of its simplicity, ease of implementation and comparably low performance overhead. Some recent...

    Josep Balasch, Sebastian Faust in Advances in Cryptology -- EUROCRYPT 2015 (2015)

  14. No Access

    Chapter and Conference Paper

    A Note on the Use of Margins to Compare Distinguishers

    Relative distinguishing margins are becoming a popular measure for comparing distinguishers. This paper presents some examples that show that this measure, although informative and intuitively sound, should no...

    Oscar Reparaz, Benedikt Gierlichs in Constructive Side-Channel Analysis and Sec… (2014)

  15. No Access

    Chapter and Conference Paper

    Generic DPA Attacks: Curse or Blessing?

    Generic DPA attacks, such as MIA, have been recently proposed as a method to mount DPA attacks without the need for possibly restrictive assumptions on the leakage behaviour. Previous work identified some shor...

    Oscar Reparaz, Benedikt Gierlichs in Constructive Side-Channel Analysis and Sec… (2014)

  16. Chapter and Conference Paper

    Higher-Order Threshold Implementations

    Higher-order differential power analysis attacks are a serious threat for cryptographic hardware implementations. In particular, glitches in the circuit make it hard to protect the implementation with masking....

    Begül Bilgin, Benedikt Gierlichs, Svetla Nikova in Advances in Cryptology – ASIACRYPT 2014 (2014)

  17. No Access

    Chapter and Conference Paper

    A More Efficient AES Threshold Implementation

    Threshold Implementations provide provable security against first-order power analysis attacks for hardware and software implementations. Like masking, the approach relies on secret sharing but it differs in t...

    Begül Bilgin, Benedikt Gierlichs in Progress in Cryptology – AFRICACRYPT 2014 (2014)

  18. No Access

    Chapter and Conference Paper

    Power Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMs

    Atmel CryptoMemory devices offer non-volatile memory with access control and authenticated encryption. They are used in commercial and military applications e.g. to prevent counterfeiting, to store secrets suc...

    Josep Balasch, Benedikt Gierlichs, Roel Verdult in Topics in Cryptology – CT-RSA 2012 (2012)

  19. Chapter and Conference Paper

    Selecting Time Samples for Multivariate DPA Attacks

    Masking on the algorithm level, i.e. concealing all sensitive intermediate values with random data, is a popular countermeasure against DPA attacks. A properly implemented masking scheme forces an attacker to ...

    Oscar Reparaz, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2012)

  20. No Access

    Chapter and Conference Paper

    Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output

    Implementation attacks pose a serious threat for the security of cryptographic devices and there are a multitude of countermeasures that are used to prevent them. Two countermeasures used in implementations of...

    Benedikt Gierlichs, Jörn-Marc Schmidt in Progress in Cryptology – LATINCRYPT 2012 (2012)

previous disabled Page of 2