D Oswald, C Paar - … on Cryptographic Hardware and Embedded Systems, 2011 - Springer
With the advent of side-channel analysis, implementations of mathematically secure ciphers face a new threat: by exploiting the physical characteristics of a device, adversaries are able …
Abstract The Mutual Information Analysis (MIA) is a generic side-channel distinguisher that has been introduced at CHES 2008. This paper brings three contributions with respect to its …
Microarchitectural side channels expose unprotected software to information leakage attacks where a software adversary is able to track runtime behavior of a benign process …
Abstract Open Data Processing Services (ODPS) offers vast storage capacity and excellent efficiency, which collects and stores a lot of data. As an essential component of ODPS …
Given the need for efficient high-performance computing, computer architectures combining central processing units (CPUs), graphics processing units (GPUs), and field-programmable …
A Bauer, É Jaulmes, E Prouff, JR Reinhard… - Cryptography and …, 2015 - Springer
Elliptic curves based algorithms are nowadays widely spread among embedded systems. They indeed have the double advantage of providing efficient implementations with short …
S Weiser, A Zankl, R Spreitzer, K Miller… - 27th USENIX Security …, 2018 - usenix.org
Cryptographic implementations are a valuable target for address-based side-channel attacks and should, thus, be protected against them. Countermeasures, however, are often …
Power side-channel attacks (SCAs) have become a major concern to the security community due to their noninvasive feature, low-cost, and effectiveness in extracting secret information …
N Müller, A Moradi - IACR Transactions on Cryptographic Hardware …, 2022 - tches.iacr.org
Abstract Even today, Side-Channel Analysis attacks pose a serious threat to the security of cryptographic implementations fabricated with low-power and nanoscale feature …