This paper presents an efficient map generation technique for evaluating the intensity of electromagnetic (EM) radiation associated with information leakage for cryptographic …
Secure implementation of cryptographic algorithms is an important area of research. Cryptographer prefers to secure algorithms against known attacks; however designer …
NT Do, VP Hoang, CK Pham - IEEE Access, 2022 - ieeexplore.ieee.org
Side channel attack (SCA) is a class of crypt-analytic attacks for security evaluation of cryptographic and embedded microprocessor implementations. Among several SCA …
Physical implementations of cryptographic algorithms may let relatively side channel information. By analyzing this information leakage, the confidential data, like the …
S-boxes are usual targets of side-channel attacks and it is an open problem to develop design techniques for S-boxes with improved DPA resistance. One result along that line is …
The cyber-security of an embedded device is a crucial issue especially in the Internet of Things (IoT) paradigm, since the physical accessibility to the smart transducers eases an …
Z Zheng, Y Yan, Y Liu, L Li, Y Chang - Electronics, 2022 - mdpi.com
The test vector leakage assessment (TVLA) is a widely used side-channel power leakage detection technology which requires evaluators to collect as many power traces as possible …
NT Do, VP Hoang - Industrial Networks and Intelligent Systems: 6th EAI …, 2020 - Springer
Abstract Correlation Power Analysis (CPA) is an efficient way to recover the secret key of the target device. CPA technique exploits the linear relationship between the power model and …
W Hu, L Wu, A Wang, X Xie, Z Zhu… - 2014 Tenth International …, 2014 - ieeexplore.ieee.org
Yongdae K ea al. poposed biasing power traces to improve correlation in power analysis attack in 2010. However this method abandons large numbers of power traces which is …