Improving CEMA using correlation optimization

P Robyns, P Quax, W Lamotte - IACR Transactions on Cryptographic …, 2019 - tches.iacr.org
Sensitive cryptographic information, eg AES secret keys, can be extracted from the
electromagnetic (EM) leakages unintentionally emitted by a device using techniques such …

Blind source separation from single measurements using singular spectrum analysis

S Merino Del Pozo, FX Standaert - … , Saint-Malo, France, September 13-16 …, 2015 - Springer
Abstract Singular Spectrum Analysis (SSA) is a powerful data decomposition/recompose
technique that can be used to reduce the noise in time series. Compared to existing …

Leverage the average: Averaged sampling in pre-silicon side-channel leakage assessment

P Kiaei, Z Liu, P Schaumont - … of the Great Lakes Symposium on VLSI …, 2022 - dl.acm.org
Pre-silicon side-channel leakage assessment is a useful tool to identify hardware
vulnerabilities at design time, but it requires many high-resolution power traces and …

Design and validation through a frequency-based metric of a new countermeasure to protect nanometer ICs from side-channel attacks

S Bongiovanni, F Centurelli, G Scotti… - Journal of Cryptographic …, 2015 - Springer
Electrical and capacitive mismatches are outstanding issues in modern submicron
technologies, and must be considered already during the design steps. In this work, we …

Collision based attacks in practice

I Diop, PY Liardet, Y Linge… - … Euromicro Conference on …, 2015 - ieeexplore.ieee.org
Chosen-Message Simple Power Analysis, also called Collision Based Attacks (CBA), have
been proposed by Fouque, Yen and Homma. These attacks aim at inducing and detecting …

Collision for estimating SCA measurement quality and related applications

I Diop, M Carbone, S Ordas, Y Linge, PY Liardet… - Smart Card Research …, 2016 - Springer
Abstract If the Signal to Noise Ratio (SNR) is a figure of merit commonly used in many areas
to gauge the quality of analogue measurements, its use in the context of Side-Channel …

Remote hardware attacks on connected devices

J Gravellier - 2021 - hal.science
In this thesis we evaluate software-based hardware attacks, a novel attack family that targets
connected devices such as IoT products, smartphones or cloud datacenters. These attacks …

From theory to practice: horizontal attacks on protected implementations of modular exponentiations

I Diop, Y Linge, T Ordas, PY Liardet… - Journal of Cryptographic …, 2019 - Springer
Nowadays, horizontal or single-shot side-channel attacks against protected implementations
of RSA and similar algorithms constitute a theoretic threat against secure devices …

Side-channel and fault analysis in the presence of countermeasures: tools, theory, and practice

R Korkikian - 2016 - theses.hal.science
The goal of the thesis is to develop and improve methods for defeating protected
cryptosystems. A new signal decompositionalgorithm, called Hilbert Huang Transform, was …

Estimating the Signal-to-Noise ratio under repeated sampling of the same centered signal: applications to side-channel attacks on a cryptoprocessor

GR Ducharme, P Maurine - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
This paper introduces an estimator of the signal-to-noise ratio in the framework where a
noisy source emits the same signal a number n of times. The estimator has the structure of a …