[HTML][HTML] Power side-channel attack analysis: A review of 20 years of study for the layman

M Randolph, W Diehl - Cryptography, 2020 - mdpi.com
Physical cryptographic implementations are vulnerable to so-called side-channel attacks, in
which sensitive information can be recovered by analyzing physical phenomena of a device …

Applications of machine learning techniques in side-channel attacks: a survey

B Hettwer, S Gehrer, T Güneysu - Journal of Cryptographic Engineering, 2020 - Springer
With increasing expansion of the Internet of Things, embedded devices equipped with
cryptographic modules become an important factor to protect sensitive data. Even though …

One for all–all for one: unifying standard differential power analysis attacks

S Mangard, E Oswald, FX Standaert - IET Information Security, 2011 - IET
In this study, the authors examine the relationship between and the efficiency of different
approaches to standard (univariate) differential power analysis (DPA) attacks. The authors …

A statistical model for DPA with novel algorithmic confusion analysis

Y Fei, Q Luo, AA Ding - … Hardware and Embedded Systems–CHES 2012 …, 2012 - Springer
Side-channel attacks (SCAs) exploit weakness in the physical implementation of
cryptographic algorithms, and have emerged as a realistic threat to many critical embedded …

Power side-channel leakage assessment framework at register-transfer level

N Pundir, J Park, F Farahmandi… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Power side-channel (PSC) attacks received significant attention over the past two decades
due to their effectiveness in breaking mathematically strong cryptographic implementations …

Univariate side channel attacks and leakage modeling

J Doget, E Prouff, M Rivain, FX Standaert - Journal of Cryptographic …, 2011 - Springer
Differential power analysis is a powerful cryptanalytic technique that exploits information
leaking from physical implementations of cryptographic algorithms. During the two last …

How (not) to use welch's t-test in side-channel security evaluations

FX Standaert - Smart Card Research and Advanced Applications: 17th …, 2019 - Springer
Abstract The Test Vector Leakage Assessment (TVLA) methodology is a qualitative tool
relying on Welch's T-test to assess the security of cryptographic implementations against …

Using subspace-based template attacks to compare and combine power and electromagnetic information leakages

FX Standaert, C Archambeau - International Workshop on Cryptographic …, 2008 - Springer
The power consumption and electromagnetic radiation are among the most extensively
used side-channels for analyzing physically observable cryptographic devices. This paper …

Towards efficient second-order power analysis

J Waddle, D Wagner - International Workshop on Cryptographic Hardware …, 2004 - Springer
Viable cryptosystem designs must address power analysis attacks, and masking is a
commonly proposed technique for defending against these side-channel attacks. It is …

Mutual information analysis: A generic side-channel distinguisher

B Gierlichs, L Batina, P Tuyls, B Preneel - International Workshop on …, 2008 - Springer
We propose a generic information-theoretic distinguisher for differential side-channel
analysis. Our model of side-channel leakage is a refinement of the one given by Standaert et …