Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    An In-Depth Security Evaluation of the Nintendo DSi Gaming Console

    The Nintendo DSi is a handheld gaming console released by Nintendo in 2008. In Nintendo’s line-up the DSi served as a successor to the DS and was later succeeded by the 3DS. The security systems of both the DS...

    pcy Sluys, Lennert Wouters in Smart Card Research and Advanced Applicati… (2024)

  2. No Access

    Chapter and Conference Paper

    Provable Secure Software Masking in the Real-World

    We evaluate eight implementations of provable secure side-channel masking schemes that were published in top-tier academic venues such as Eurocrypt, Asiacrypt, CHES and SAC. Specifically, we evaluate the side-...

    Arthur Beckers, Lennert Wouters in Constructive Side-Channel Analysis and Sec… (2022)

  3. No Access

    Chapter and Conference Paper

    On the Susceptibility of Texas Instruments SimpleLink Platform Microcontrollers to Non-invasive Physical Attacks

    We investigate the susceptibility of the Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks. We extracted the ROM bootloader of these microcontrollers and then analysed it ...

    Lennert Wouters, Benedikt Gierlichs in Constructive Side-Channel Analysis and Sec… (2022)

  4. No Access

    Chapter and Conference Paper

    Design Considerations for EM Pulse Fault Injection

    Electromagnetic-fault injection (EM-FI) setups are appealing since they can be made at a low cost, achieve relatively high spatial resolutions, and avoid the need of tampering with the PCB or packaging of the ...

    Arthur Beckers, Masahiro Kinugawa in Smart Card Research and Advanced Applicati… (2020)

  5. No Access

    Chapter and Conference Paper

    An In-Depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P

    Laser fault injection is a complex, physical process with many parameters that influence the success of the injection. Some parameters are difficult to control. While many works have established that focused lase...

    Dilip S. V. Kumar, Arthur Beckers in Smart Card Research and Advanced Applicati… (2019)

  6. No Access

    Book and Conference Proceedings

    Constructive Side-Channel Analysis and Secure Design

    9th International Workshop, COSADE 2018, Singapore, April 23–24, 2018, Proceedings

    Junfeng Fan, Benedikt Gierlichs in Lecture Notes in Computer Science (2018)

  7. No Access

    Chapter and Conference Paper

    A First-Order Chosen-Plaintext DPA Attack on the Third Round of DES

    DPA attacks usually exhibit a “divide-and-conquer” property: the adversary needs to enumerate only a small space of the key (a key sub-space) when performing the DPA attack. This is achieved trivially in the o...

    Oscar Reparaz, Benedikt Gierlichs in Smart Card Research and Advanced Applications (2018)

  8. No Access

    Chapter and Conference Paper

    Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers

    We present a fault analysis study of the ChaCha and Salsa families of stream ciphers. We first show that attacks like differential fault analysis that are common in the block cipher setting are not applicable ...

    Arthur Beckers, Benedikt Gierlichs in Smart Card Research and Advanced Applicati… (2018)

  9. Article

    Introduction to the CHES 2016 special issue

    Benedikt Gierlichs, Axel Y. Poschmann in Journal of Cryptographic Engineering (2017)

  10. Chapter and Conference Paper

    Consolidating Inner Product Masking

    Masking schemes are a prominent countermeasure to defeat power analysis attacks. One of their core ingredients is the encoding function. Due to its simplicity and comparably low complexity overheads, many mask...

    Josep Balasch, Sebastian Faust in Advances in Cryptology – ASIACRYPT 2017 (2017)

  11. Chapter and Conference Paper

    Fast Leakage Assessment

    We describe a fast technique for performing the computationally heavy part of leakage assessment, in any statistical moment (or other property) of the leakage samples distributions. The proposed technique outp...

    Oscar Reparaz, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2017)

  12. No Access

    Chapter and Conference Paper

    Does Coupling Affect the Security of Masked Implementations?

    Masking schemes achieve provable security against side-channel analysis by using secret sharing to decorrelate key-dependent intermediate values of the cryptographic algorithm and side-channel information. Mas...

    Thomas De Cnudde, Begül Bilgin in Constructive Side-Channel Analysis and Sec… (2017)

  13. No Access

    Book and Conference Proceedings

    Cryptographic Hardware and Embedded Systems – CHES 2016

    18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings

    Benedikt Gierlichs, Axel Y. Poschmann in Lecture Notes in Computer Science (2016)

  14. No Access

    Chapter and Conference Paper

    Design and Implementation of a Waveform-Matching Based Triggering System

    Implementation attacks such as side channel attacks and fault attacks require triggering mechanisms to activate the acquisition device or fault injection equipment. Most academic works work with a very simple ...

    Arthur Beckers, Josep Balasch in Constructive Side-Channel Analysis and Sec… (2016)

  15. Chapter and Conference Paper

    Consolidating Masking Schemes

    In this paper we investigate relations between several masking schemes. We show that the Ishai–Sahai–Wagner private circuits construction is closely related to Threshold Implementations and the Trichina gate. ...

    Oscar Reparaz, Begül Bilgin, Svetla Nikova in Advances in Cryptology -- CRYPTO 2015 (2015)

  16. Chapter and Conference Paper

    DPA, Bitslicing and Masking at 1 GHz

    We present DPA attacks on an ARM Cortex-A8 processor running at 1 GHz. This high-end processor is typically found in portable devices such as phones and tablets. In our case, the processor sits in a single boa...

    Josep Balasch, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2015)

  17. No Access

    Chapter and Conference Paper

    On the Cost of Lazy Engineering for Masked Software Implementations

    Masking is one of the most popular countermeasures to mitigate side-channel analysis. Yet, its deployment in actual cryptographic devices is well known to be challenging, since designers have to ensure that th...

    Josep Balasch, Benedikt Gierlichs in Smart Card Research and Advanced Applicati… (2015)

  18. Chapter and Conference Paper

    Inner Product Masking Revisited

    Masking is a popular countermeasure against side channel attacks. Many practical works use Boolean masking because of its simplicity, ease of implementation and comparably low performance overhead. Some recent...

    Josep Balasch, Sebastian Faust in Advances in Cryptology -- EUROCRYPT 2015 (2015)

  19. No Access

    Chapter and Conference Paper

    A Note on the Use of Margins to Compare Distinguishers

    Relative distinguishing margins are becoming a popular measure for comparing distinguishers. This paper presents some examples that show that this measure, although informative and intuitively sound, should no...

    Oscar Reparaz, Benedikt Gierlichs in Constructive Side-Channel Analysis and Sec… (2014)

  20. No Access

    Chapter and Conference Paper

    Generic DPA Attacks: Curse or Blessing?

    Generic DPA attacks, such as MIA, have been recently proposed as a method to mount DPA attacks without the need for possibly restrictive assumptions on the leakage behaviour. Previous work identified some shor...

    Oscar Reparaz, Benedikt Gierlichs in Constructive Side-Channel Analysis and Sec… (2014)

previous disabled Page of 3