As shown previously in Sect. 3.2. 3, the Correlation Power Analysis (CPA) is a method that allows to recover the secret information concealed in embedded devices [1]. It consists in …
S Seçkiner, S Köse - IEEE Transactions on Very Large Scale …, 2021 - ieeexplore.ieee.org
The security and privacy of modern computing devices have become an important design metric with the unprecedented increase in the amount of personal information stored in the …
AA Pammu, KS Chong, Y Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
We propose a Profiling through Relevance-Learning (PRL) technique on Physical Leakage Information (PLI) to extract highly correlated PLI with processed data, as to achieve a highly …
Side-channel attacks (SCAs) and fault injection attacks (FIAs) allow an opponent to have partial access to the internal behavior of the hardware. Since the end of the 1990s, many …
M Ouladj, S Guilley, P Guillot, F Mokrane - Journal of Cryptographic …, 2022 - Springer
Cryptographic software is particularly vulnerable to side-channel attacks when programmed in embedded devices. Indeed, the leakage is particularly intense compared to the noise …
N Bruneau, C Christen, JL Danger, A Facon… - Algebra, Codes and …, 2019 - Springer
Masking countermeasure is implemented to thwart side-channel attacks. The maturity of high-order masking schemes has reached the level where the concepts are sound and …
S Seçkiner, S Köse - 2021 IEEE 34th International System-on …, 2021 - ieeexplore.ieee.org
Side-channel attacks have recently become one of primary threats that target modern computing devices. Several techniques have been proposed to improve the strength of side …
N Veshchikov, SF Medeiros… - Journal of Cyber …, 2016 - journals.riverpublishers.com
IoT devices have very strong requirements on all the resources such as memory, randomness, energy and execution time. This paper proposes a number of scalable …
C Ou, X Zhou, SK Lam, C Zhou… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
An accurate leakage model is critical to side-channel attacks and evaluations. Leakage certification plays an important role to address the following question:“how good is my …