Search
Search Results
-
Amplitude-modulated EM side-channel attack on provably secure masked AES
Recently a new type of side channels was discovered, called amplitude-modulated electromagnetic (EM) emanations from mixed-signal circuits. Unlike...
-
Constructive Side-Channel Analysis and Secure Design 15th International Workshop, COSADE 2024, Gardanne, France, April 9–10, 2024, Proceedings
This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE...
-
-
Profiling Side-Channel Attacks on Dilithium
We present an end-to-end (equivalent) key recovery attack on the Dilithium lattice-based signature scheme, one of the winners of the NIST postquantum... -
A side-channel attack on a masked and shuffled software implementation of Saber
In this paper, we show that a software implementation of IND-CCA-secure Saber key encapsulation mechanism protected by first-order masking and...
-
Time Is Money, Friend! Timing Side-Channel Attack Against Garbled Circuit Constructions
With the advent of secure function evaluation (SFE), distrustful parties can jointly compute on their private inputs without disclosing anything... -
A new perspective exploration of machine learning algorithms for defending Side-Channel attacks
Machine learning algorithms are used in various real-time applications, where security is one of the major problems. Security is applied in various...
-
MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack
In this work, we conduct in-depth characterization to quantify the impact of DRAM refresh, the location of the target memory object within a... -
A novel non-profiled side channel attack based on multi-output regression neural network
Differential deep learning analysis (DDLA) is the first side-channel attack (SCA) evaluation using deep learning (DL) in the non-profiled scenario....
-
SRISC: Open Source Soft Processor Side Channel Analysis Attack Framework Using RISC-V
Side channel analysis (SCA) attacks on soft processor systems (such as RISC-V and LEON3) are typically performed on FPGA prototy** boards. For the... -
Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure
The emergence of deep learning has revolutionized side-channel attacks, making them a serious threat to cryptographic systems. Clock randomization is... -
A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming
Tolerant algebraic side-channel attack (TASCA) exploits side-channel information with an algebraic formulation of a cipher to exploit its weaknesses...
-
Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy
In the era of the Internet of Things, Bluetooth low energy (BLE/BTLE) plays an important role as a well-known wireless communication technology....
-
Leaking secrets in homomorphic encryption with side-channel attacks
Homomorphic encryption (HE) allows computing encrypted data in the ciphertext domain without knowing the encryption key. It is possible, however, to...
-
Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack
In side-channel analysis (SCA), the success of an attack is largely dependent on the dataset sizes and the number of instances in each class. The... -
Enhancing non-profiled side-channel attacks by time-frequency analysis
Side-channel analysis (SCA) has become an increasing important method to assess the physical security of cryptographic systems. In the process of...
-
A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation
In response to side-channel attacks on masked implementations of post-quantum cryptographic algorithms, a new bitsliced higher-order masked... -
Research on Side-Channel Attack Method Based on LSTM
Side channel attacks recover keys or other sensitive information by using the time, power consumption, electromagnetic radiation and fault output... -
A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts
At CHES’2021, a chosen ciphertext attack combined with belief propagation which can recover the long-term secret key of CRYSTALS-Kyber from... -
Scoring the predictions: a way to improve profiling side-channel attacks
Side-channel analysis is an important part of the security evaluations of hardware components and more specifically of those that include...