Skip to main content

and
Your search also matched 22 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

An In-Depth Security Evaluation of the Nintendo DSi Gaming Console

Include preview-only content
  1. Chapter and Conference Paper

    Consolidating Inner Product Masking

    Masking schemes are a prominent countermeasure to defeat power analysis attacks. One of their core ingredients is the encoding function. Due to its simplicity and comparably low complexity overheads, many mask...

    Josep Balasch, Sebastian Faust in Advances in Cryptology – ASIACRYPT 2017 (2017)

  2. Chapter and Conference Paper

    Fast Leakage Assessment

    We describe a fast technique for performing the computationally heavy part of leakage assessment, in any statistical moment (or other property) of the leakage samples distributions. The proposed technique outp...

    Oscar Reparaz, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2017)

  3. Chapter and Conference Paper

    Consolidating Masking Schemes

    In this paper we investigate relations between several masking schemes. We show that the Ishai–Sahai–Wagner private circuits construction is closely related to Threshold Implementations and the Trichina gate. ...

    Oscar Reparaz, Begül Bilgin, Svetla Nikova in Advances in Cryptology -- CRYPTO 2015 (2015)

  4. Chapter and Conference Paper

    DPA, Bitslicing and Masking at 1 GHz

    We present DPA attacks on an ARM Cortex-A8 processor running at 1 GHz. This high-end processor is typically found in portable devices such as phones and tablets. In our case, the processor sits in a single boa...

    Josep Balasch, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2015)

  5. Chapter and Conference Paper

    Inner Product Masking Revisited

    Masking is a popular countermeasure against side channel attacks. Many practical works use Boolean masking because of its simplicity, ease of implementation and comparably low performance overhead. Some recent...

    Josep Balasch, Sebastian Faust in Advances in Cryptology -- EUROCRYPT 2015 (2015)

  6. Chapter and Conference Paper

    Higher-Order Threshold Implementations

    Higher-order differential power analysis attacks are a serious threat for cryptographic hardware implementations. In particular, glitches in the circuit make it hard to protect the implementation with masking....

    Begül Bilgin, Benedikt Gierlichs, Svetla Nikova in Advances in Cryptology – ASIACRYPT 2014 (2014)

  7. Chapter and Conference Paper

    Selecting Time Samples for Multivariate DPA Attacks

    Masking on the algorithm level, i.e. concealing all sensitive intermediate values with random data, is a popular countermeasure against DPA attacks. A properly implemented masking scheme forces an attacker to ...

    Oscar Reparaz, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2012)

  8. Chapter and Conference Paper

    Theory and Practice of a Leakage Resilient Masking Scheme

    A recent trend in cryptography is to formally prove the leakage resilience of cryptographic implementations – that is, one formally shows that a scheme remains provably secure even in the presence of side channel...

    Josep Balasch, Sebastian Faust in Advances in Cryptology – ASIACRYPT 2012 (2012)

  9. Chapter and Conference Paper

    To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order

    We present a novel combined attack against ECC implementations that exploits specially crafted, but valid input points. The core idea is that after fault injection, these points turn into points of very low or...

    Junfeng Fan, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2011)

  10. Chapter and Conference Paper

    The World Is Not Enough: Another Look on Second-Order DPA

    In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysis and Gaussian templates are ess...

    François-Xavier Standaert in Advances in Cryptology - ASIACRYPT 2010 (2010)

  11. Chapter and Conference Paper

    Differential Cluster Analysis

    We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions and it combines features from previousl...

    Lejla Batina, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2009)

  12. Chapter and Conference Paper

    Mutual Information Analysis

    We propose a generic information-theoretic distinguisher for differential side-channel analysis. Our model of side-channel leakage is a refinement of the one given by Standaert et al. An embedded device containin...

    Benedikt Gierlichs, Lejla Batina, Pim Tuyls in Cryptographic Hardware and Embedded System… (2008)

  13. Chapter and Conference Paper

    Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration

    Dynamically reconfigurable systems are known to have many advantages such as area and power reduction. The drawbacks of these systems are the reconfiguration delay and the overhead needed to provide reconfigur...

    Nele Mentens, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2008)

  14. Chapter and Conference Paper

    DPA-Resistance Without Routing Constraints?

    MDPL is a logic style claiming to provide resistance against Differential Side Channel Analysis on power consumption measurements. In this paper we show that the power consumption of a non-linear MDPL gate can...

    Benedikt Gierlichs in Cryptographic Hardware and Embedded Systems - CHES 2007 (2007)

  15. Chapter and Conference Paper

    Templates vs. Stochastic Methods

    Template Attacks and the Stochastic Model provide advanced methods for side channel cryptanalysis that make use of ‘a-priori’ knowledge gained from a profiling step. For a systematic comparison of Template Att...

    Benedikt Gierlichs, Kerstin Lemke-Rust in Cryptographic Hardware and Embedded System… (2006)