Skip to main content

previous disabled Page of 4
and
  1. No Access

    Chapter and Conference Paper

    A Novel Framework for Explainable Leakage Assessment

    Schemes such as Common Criteria or FIPS 140-3 require the assessment of cryptographic implementations with respect to side channels at high security levels. Instead of a “penetration testing” style approach wh...

    Si Gao, Elisabeth Oswald in Advances in Cryptology – EUROCRYPT 2024 (2024)

  2. No Access

    Book and Conference Proceedings

    Topics in Cryptology – CT-RSA 2024

    Cryptographers’ Track at the RSA Conference 2024, San Francisco, CA, USA, May 6–9, 2024, Proceedings

    Elisabeth Oswald in Lecture Notes in Computer Science (2024)

  3. No Access

    Chapter and Conference Paper

    Exploring Multi-task Learning in the Context of Masked AES Implementations

    Deep learning is very efficient at breaking masked implementations even when the attacker does not assume knowledge of the masks. However, recent works pointed out a significant challenge: overcoming the initi...

    Thomas Marquet, Elisabeth Oswald in Constructive Side-Channel Analysis and Secure Design (2024)

  4. No Access

    Chapter and Conference Paper

    Not Optimal but Efficient: A Distinguisher Based on the Kruskal-Wallis Test

    Research about the theoretical properties of side channel distinguishers revealed the rules by which to maximise the probability of first order success (“optimal distinguishers”) under different assumptions ab...

    Yan Yan, Elisabeth Oswald, Arnab Roy in Information Security and Cryptology – ICISC 2023 (2024)

  5. No Access

    Chapter and Conference Paper

    Comparing Key Rank Estimation Methods

    Recent works on key rank estimation methods claim that algorithmic key rank estimation is too slow, and suggest two new ideas: replacing repeat attacks with simulated attacks (PS-TH-GE rank estimation), and a ...

    Rebecca Young, Luke Mather, Elisabeth Oswald in Smart Card Research and Advanced Applicati… (2023)

  6. No Access

    Chapter and Conference Paper

    A Comparison of Multi-task Learning and Single-Task Learning Approaches

    In this paper, we provide experimental evidence for the benefits of multi-task learning in the context of masked AES implementations (via the ASCADv1-r and ASCADv2 databases). We develop an approach for compar...

    Thomas Marquet, Elisabeth Oswald in Applied Cryptography and Network Security Workshops (2023)

  7. No Access

    Chapter and Conference Paper

    A Novel Completeness Test for Leakage Models and Its Application to Side Channel Attacks and Responsibly Engineered Simulators

    Today’s side channel attack targets are often complex devices in which instructions are processed in parallel and work on 32-bit data words. Consequently, the state that is involved in producing leakage in these ...

    Si Gao, Elisabeth Oswald in Advances in Cryptology – EUROCRYPT 2022 (2022)

  8. No Access

    Chapter and Conference Paper

    Towards Micro-architectural Leakage Simulators: Reverse Engineering Micro-architectural Leakage Features Is Practical

    Leakage simulators offer the tantalising promise of easy and quick testing of software with respect to the presence of side channel leakage. The quality of their build in leakage models is therefore crucial, t...

    Si Gao, Elisabeth Oswald, Dan Page in Advances in Cryptology – EUROCRYPT 2022 (2022)

  9. Article

    Open Access

    Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware

    FrodoKEM is a lattice-based key encapsulation mechanism, currently a semi-finalist in NIST’s post-quantum standardisation effort. A condition for these candidates is to use NIST standards for sources of random...

    James Howe, Marco Martinoli, Elisabeth Oswald in Journal of Cryptographic Engineering (2021)

  10. No Access

    Chapter and Conference Paper

    A Systematic Appraisal of Side Channel Evaluation Strategies

    In this paper we examine the central question that is how well do side channel evaluation regimes capture the true security level of a product. Concretely, answering this question requires considering the opti...

    Melissa Azouaoui, Davide Bellizia, Ileana Buhan in Security Standardisation Research (2020)

  11. Chapter and Conference Paper

    Assessing the Feasibility of Single Trace Power Analysis of Frodo

    Lattice-based schemes are among the most promising post-quantum schemes, yet the effect of both parameter and implementation choices on their side-channel resilience is still poorly understood. Aysu et al. (HO...

    Joppe W. Bos, Simon Friedberger in Selected Areas in Cryptography – SAC 2018 (2019)

  12. No Access

    Chapter and Conference Paper

    Constructing TI-Friendly Substitution Boxes Using Shift-Invariant Permutations

    The threat posed by side channels requires ciphers that can be efficiently protected in both software and hardware against such attacks. In this paper, we proposed a novel Sbox construction based on iterations...

    Si Gao, Arnab Roy, Elisabeth Oswald in Topics in Cryptology – CT-RSA 2019 (2019)

  13. No Access

    Chapter and Conference Paper

    A Critical Analysis of ISO 17825 (‘Testing Methods for the Mitigation of Non-invasive Attack Classes Against Cryptographic Modules’)

    The ISO standardisation of ‘Testing methods for the mitigation of non-invasive attack classes against cryptographic modules’ (ISO/IEC 17825:2016) specifies the use of the Test Vector Leakage Assessment (TVLA) ...

    Carolyn Whitnall, Elisabeth Oswald in Advances in Cryptology – ASIACRYPT 2019 (2019)

  14. No Access

    Chapter and Conference Paper

    A Systematic Study of the Impact of Graphical Models on Inference-Based Attacks on AES

    Belief propagation, or the sum-product algorithm, is a powerful and well known method for inference on probabilistic graphical models, which has been proposed for the specific use in side channel analysis by V...

    Joey Green, Arnab Roy, Elisabeth Oswald in Smart Card Research and Advanced Applications (2019)

  15. No Access

    Chapter and Conference Paper

    Non-profiled Mask Recovery: The Impact of Independent Component Analysis

    As one of the most prevalent SCA countermeasures, masking schemes are designed to defeat a broad range of side channel attacks. An attack vector that is suitable for low-order masking schemes is to try and dir...

    Si Gao, Elisabeth Oswald, Hua Chen, Wei ** in Smart Card Research and Advanced Applications (2019)

  16. No Access

    Article

    NZGS klar abgrenzen von Zöliakie und Weizen- oder Getreidesensitivität

    Das Bild der Zöliakie hat sich deutlich vom malabsorptiven Verlauf, hin zu einem chamäleonartigen Verlauf mit wenigen oder nur oligosymptomatischen gastrointestinalen Beschwerden, aber zunehmend extraintestina...

    Prof. Dr. med. Martin Raithel, Dr. med. Volker Rödl, Jaqueline Ehrle in Gastro-News (2018)

  17. No Access

    Chapter and Conference Paper

    A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher

    Distinguishers play an important role in Side Channel Analysis (SCA), where real world leakage information is compared against hypothetical predictions in order to guess at the underlying secret key. However, ...

    ** Zhou, Carolyn Whitnall in Smart Card Research and Advanced Applicati… (2018)

  18. Chapter and Conference Paper

    Quantum Key Search with Side Channel Advice

    Recently, a number of results have been published that show how to combine classical cryptanalysis with quantum algorithms, thereby (potentially) achieving considerable speed-ups. We follow this trend but add ...

    Daniel P. Martin, Ashley Montanaro in Selected Areas in Cryptography – SAC 2017 (2018)

  19. No Access

    Chapter and Conference Paper

    Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited

    Motivated by the need to assess the concrete security of a device after a side channel attack, there has been a flurry of recent work designing both key rank and key enumeration algorithms. Two main competitor...

    Daniel P. Martin, Luke Mather, Elisabeth Oswald in Topics in Cryptology – CT-RSA 2018 (2018)

  20. Chapter and Conference Paper

    Categorising and Comparing Cluster-Based DPA Distinguishers

    Side-channel distinguishers play an important role in differential power analysis, where real world leakage information is compared against hypothetical predictions in order to guess at the underlying secret k...

    ** Zhou, Carolyn Whitnall in Selected Areas in Cryptography – SAC 2017 (2018)

previous disabled Page of 4