With Great Power Come Great Side Channels: Statistical Timing {Side-Channel} Analyses with Bounded Type-1 Errors

M Dunsche, M Maehren, N Erinola, R Merget… - 33rd USENIX Security …, 2024 - usenix.org
Constant-time implementations are essential to guarantee the security of secret-key
operations. According to Jancar et al.[42], most cryptographic developers do not use …

FOBOS 3: An Open-Source Platform for Side-Channel Analysis and Benchmarking

E Ferrufino, L Beckwith, A Abdulgadir… - Proceedings of the 2023 …, 2023 - dl.acm.org
The lightweight cryptography (LWC) standardization process by the National Institute of
Standards and Technology (NIST) of the US is the latest example of competitions that …

基于双样本KS 检验的非特定TVLA 方法

郑震, 严迎建, 蔡爵嵩, 刘燕江 - 通信学报, 2023 - infocomm-journal.com
测试向量泄露评估(TVLA) 在能耗样本量较少时易出现“假阴性” 错误. 针对该问题进行了理论
推导, 发现对非特定TVLA, 能量迹中存在泄露的采样点处得到的检验统计量t …

[PDF][PDF] Final-round updates on Romulus

C Guo, T Iwata, M Khairallah, K Minematsu, T Peyrin - 2022 - csrc.nist.gov
The Skinny twekable block cipher [3] was designed to be secure against related-tweakey
attacks, an attack model very generous to the adversary as he can fully control the tweak …