E De Chérisey, S Guilley, O Rioul… - Cryptology ePrint …, 2019 - eprint.iacr.org
Using information-theoretic tools, this paper establishes a mathematical link between the probability of success of a side-channel attack and the minimum number of queries to reach …
Power side-channel (PSC) attacks received significant attention over the past two decades due to their effectiveness in breaking mathematically strong cryptographic implementations …
Differential Power Analysis (DPA) has been an active area of research for the past two decades to study the attacks for extracting secret information from cryptographic …
L Lerman, G Bontempi… - International Journal of …, 2014 - inderscienceonline.com
In cryptography, a side-channel attack is any attack based on the analysis of measurements related to the physical implementation of a cryptosystem. Nowadays, the possibility of …
Sufficient good features are indispensable to train well-performed machine learning models. However, it is com-mon that good features are not always enough, where feature …
Since their introduction over two decades ago, side-channel attacks have presented a serious security threat. While many ciphers' implementations employ masking techniques to …
In this paper, we introduce a new approach to side-channel key recovery, that combines the low time/memory complexity and noise tolerance of standard (divide and conquer) …
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation …
We describe how Pearson's χ 2-test can be used as a natural complement to Welch's t-test for black box leakage detection. In particular, we show that by using these two tests in …