Advanced modes in AES: Are they safe from power analysis based side channel attacks?

D Jayasinghe, R Ragel, JA Ambrose… - 2014 IEEE 32nd …, 2014 - ieeexplore.ieee.org
Advanced Encryption Standard (AES) is arguably the most popular symmetric block cipher
algorithm. The commonly used mode of operation in AES is the Electronic Codebook (ECB) …

Efficient evaluation of EM radiation associated with information leakage from cryptographic devices

Y Hayashi, N Homma, T Mizuki… - IEEE Transactions …, 2012 - ieeexplore.ieee.org
This paper presents an efficient map generation technique for evaluating the intensity of
electromagnetic (EM) radiation associated with information leakage for cryptographic …

Correlation power analysis of modes of encryption in AES and its countermeasures

S Fahd, M Afzal, H Abbas, W Iqbal… - Future Generation …, 2018 - Elsevier
Secure implementation of cryptographic algorithms is an important area of research.
Cryptographer prefers to secure algorithms against known attacks; however designer …

Low complexity correlation power analysis by combining power trace biasing and correlation distribution techniques

NT Do, VP Hoang, CK Pham - IEEE Access, 2022 - ieeexplore.ieee.org
Side channel attack (SCA) is a class of crypt-analytic attacks for security evaluation of
cryptographic and embedded microprocessor implementations. Among several SCA …

Implementation of CPA analysis against AES design on FPGA

N Benhadjyoussef, H Mestiri… - 2012 International …, 2012 - ieeexplore.ieee.org
Physical implementations of cryptographic algorithms may let relatively side channel
information. By analyzing this information leakage, the confidential data, like the …

Modified transparency order property: solution or just another attempt

S Picek, B Mazumdar, D Mukhopadhyay… - Security, Privacy, and …, 2015 - Springer
S-boxes are usual targets of side-channel attacks and it is an open problem to develop
design techniques for S-boxes with improved DPA resistance. One result along that line is …

The role of metrology in the cyber-security of embedded devices

P Arpaia, F Caputo, A Cioffi, A Esposito - Acta IMEKO, 2023 - acta.imeko.org
The cyber-security of an embedded device is a crucial issue especially in the Internet of
Things (IoT) paradigm, since the physical accessibility to the smart transducers eases an …

An Efficiency–Accuracy Balanced Power Leakage Evaluation Framework Utilizing Principal Component Analysis and Test Vector Leakage Assessment

Z Zheng, Y Yan, Y Liu, L Li, Y Chang - Electronics, 2022 - mdpi.com
The test vector leakage assessment (TVLA) is a widely used side-channel power leakage
detection technology which requires evaluators to collect as many power traces as possible …

An efficient side channel attack technique with improved correlation power analysis

NT Do, VP Hoang - Industrial Networks and Intelligent Systems: 6th EAI …, 2020 - Springer
Abstract Correlation Power Analysis (CPA) is an efficient way to recover the secret key of the
target device. CPA technique exploits the linear relationship between the power model and …

Adaptive chosen-plaintext correlation power analysis

W Hu, L Wu, A Wang, X Xie, Z Zhu… - 2014 Tenth International …, 2014 - ieeexplore.ieee.org
Yongdae K ea al. poposed biasing power traces to improve correlation in power analysis
attack in 2010. However this method abandons large numbers of power traces which is …