Effective side-channel analysis: exploiting new leakages on cryptography circuits secured with side-channel countermeasures

J Chen - 2024 - dr.ntu.edu.sg
This thesis pertains to the investigation of Side-Channel Analysis (SCA) techniques for
evaluating the security of cryptographic devices secured with side-channel …

Normalized Differential Power Analysis-for Ghost Peaks Mitigation

J Chen, JS Ng, NA Kyaw, NKZ Lwin… - … on Circuits and …, 2021 - ieeexplore.ieee.org
The attack efficacy of Differential Power Analysis (DPA), a popular side channel evaluation
technique for key extraction, is compromised by the false highest Difference Of Means …

[HTML][HTML] Power side-channel attack analysis: A review of 20 years of study for the layman

M Randolph, W Diehl - Cryptography, 2020 - mdpi.com
Physical cryptographic implementations are vulnerable to so-called side-channel attacks, in
which sensitive information can be recovered by analyzing physical phenomena of a device …

Multivariate TVLA-efficient side-channel evaluation using confidence intervals

F Bache, J Wloka, P Sasdrich… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Securing cryptographic hardware designs and software implementations against side-
channel attacks that leverage the power consumption or electromagnetic emanations of a …

Channel Estimation to Improve the Scalability of Power Leakage based Side-Channel Attacks on Cryptographic Systems

S Jin - 2020 - search.proquest.com
Side channel attacks exploit physical information that leaks from a cryptographic device in
order to extract secret information, such as secret keys, passwords, or instructions that may …

Provably Secure Countermeasures against Side-channel Attacks

PK Vadnala - 2015 - orbilu.uni.lu
Side-channel attacks exploit the fact that the implementations of cryptographic algorithms
leak information about the secret key. In power analysis attacks, the observable leakage is …

[HTML][HTML] A comprehensive survey on the non-invasive passive side-channel analysis

P Socha, V Miškovský, M Novotný - Sensors, 2022 - mdpi.com
Side-channel analysis has become a widely recognized threat to the security of
cryptographic implementations. Different side-channel attacks, as well as countermeasures …

A novel normalized variance-based differential power analysis against masking countermeasures

J Chen, JS Ng, KS Chong, Z Lin… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, we propose two normalization techniques to reduce the ghost peaks occurring
in Differential Power Analysis (DPA). Ghost peaks can be defined as the DPA output …

[PDF][PDF] THE CIRCLE OF DL-SCA

IDLB SIDE-CHANNEL - pure.tudelft.nl
For almost three decades, side-channel analysis has represented a realistic and severe
threat to embedded devices' security. As a well-known and influential class of …

How to characterize side-channel leakages more accurately?

J Liu, Y Zhou, Y Han, J Li, S Yang, D Feng - … , China, May 30–June 1, 2011 …, 2011 - Springer
The effectiveness of side-channel attacks strongly depends on to what extent the underlying
leakage model characterizes the physical leakages of cryptographic implementations and …