Analysis and improvements of the DPA contest v4 implementation

S Bhasin, N Bruneau, JL Danger, S Guilley… - Security, Privacy, and …, 2014 - Springer
DPA Contest is an international framework which allows researchers to compare their
attacks under a common setting. The latest version of DPA Contest proposes a software …

Detecting hidden leakages

A Moradi, S Guilley, A Heuser - … 2014, Lausanne, Switzerland, June 10-13 …, 2014 - Springer
Reducing the entropy of the mask is a technique which has been proposed to mitigate the
high performance overhead of masked software implementations of symmetric block …

Enhancing non-profiled side-channel attacks by time-frequency analysis

C Jin, Y Zhou - Cybersecurity, 2023 - Springer
Side-channel analysis (SCA) has become an increasing important method to assess the
physical security of cryptographic systems. In the process of SCA, the number of attack data …

A key to success: Success exponents for side-channel distinguishers

S Guilley, A Heuser, O Rioul - International Conference on Cryptology in …, 2015 - Springer
The success rate is the classical metric for evaluating the performance of side-channel
attacks. It is generally computed empirically from measurements for a particular device or …

Stochastic collision attack

N Bruneau, C Carlet, S Guilley… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
On the one hand, collision attacks have been introduced in the context of side-channel
analysis for attackers who exploit repeated code with the same data without having any …

Pipeline and batch sharing in grid workloads

D Thain, J Bent, AC Arpaci-Dusseau… - High Performance …, 2003 - ieeexplore.ieee.org
We present a study of six batch-pipeline scientific workloads that are candidates for
execution on computational grids. Whereas other studies focus on the behavior of single …

Wavelet scattering transform and ensemble methods for side-channel analysis

G Destouet, C Dumas, A Frassati, V Perrier - Constructive Side-Channel …, 2021 - Springer
Recent works in side-channel analysis have been fully relying on training classification
models to recover sensitive information from traces. However, the knowledge of an attacker …

Towards secure cryptographic software implementation against side-channel power analysis attacks

P Luo, L Zhang, Y Fei, AA Ding - 2015 IEEE 26th International …, 2015 - ieeexplore.ieee.org
Side-channel attacks have been a real threat against many embedded cryptographic
systems. A commonly used algorithmic countermeasure, random masking, incurs large …

[PDF][PDF] 对加掩加密算法的盲掩码模板攻击

王燚, 吴震, 蔺冰 - Journal on Communication/Tongxin …, 2019 - infocomm-journal.com
加掩是在加密算法的实现中使用随机掩码使敏感信息的泄露能耗随机化, 从而防止差分能量攻击
的技术手段. 目前, 对加掩防护加密算法的模板攻击的方法均要求攻击者在学习阶段了解使用的 …

Enhancing time-frequency analysis with zero-mean preprocessing

S Jin, P Johansson, HS Kim, S Hong - Sensors, 2022 - mdpi.com
Side-channel analysis is a critical threat to cryptosystems on the Internet of Things and in
relation to embedded devices, and appropriate side-channel countermeasure must be …