A comprehensive survey on the non-invasive passive side-channel analysis

P Socha, V Miškovský, M Novotný - Sensors, 2022 - mdpi.com
Side-channel analysis has become a widely recognized threat to the security of
cryptographic implementations. Different side-channel attacks, as well as countermeasures …

An efficient method for random delay generation in embedded software

JS Coron, I Kizhvatov - International Workshop on Cryptographic Hardware …, 2009 - Springer
Random delays are a countermeasure against a range of side channel and fault attacks that
is often implemented in embedded software. We propose a new method for generation of …

Trustworthiness of medical devices and body area networks

M Zhang, A Raghunathan, NK Jha - Proceedings of the IEEE, 2014 - ieeexplore.ieee.org
Implantable and wearable medical devices (IWMDs) are commonly used for diagnosing,
monitoring, and treating various medical conditions. A general trend in these medical …

Three-phase dual-rail pre-charge logic

M Bucci, L Giancane, R Luzzi, A Trifiletti - Cryptographic Hardware and …, 2006 - Springer
This paper investigates the design of a dual-rail pre-charge logic family whose power
consumption is insensitive to unbalanced load conditions thus allowing adopting a semi …

Securing CRYSTALS-Kyber in FPGA using duplication and clock randomization

M Moraitis, Y Ji, M Brisfors, E Dubrova… - IEEE Design & …, 2023 - ieeexplore.ieee.org
Editor's notes: Postquantum cryptographic circuits bring in new implementation for which
new side-channel attacks (SCAs) have been discovered including machine-learning-guided …

A statistics-based fundamental model for side-channel attack analysis

Y Fei, AA Ding, J Lao, L Zhang - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Abstract ide-channel attacks (SCAs) exploit leakage from the physical implementation of
cryptographic algorithms to recover the otherwise secret information. In the last decade …

Securing AES designs against power analysis attacks: a survey

TB Singha, RP Palathinkal… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the advent of Internet of Things (IoT), the call for hardware security has been seriously
demanding due to the risks of side-channel attacks from adversaries. Advanced encryption …

Secure double rate registers as an RTL countermeasure against power analysis attacks

D Bellizia, S Bongiovanni, P Monsurrò… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Power analysis attacks (PAAs), a class of side-channel attacks based on power
consumption measurements, are a major concern in the protection of secret data stored in …

A statistics-based success rate model for DPA and CPA

Y Fei, AA Ding, J Lao, L Zhang - Journal of Cryptographic Engineering, 2015 - Springer
Side-channel attacks (SCAs) exploit leakage from the physical implementation of
cryptographic algorithms to recover the otherwise secret information. In the last decade …

Protection circuit against differential power analysis attacks for smart cards

R Muresan, S Gregori - IEEE Transactions on Computers, 2008 - ieeexplore.ieee.org
In this paper, we present a circuit that protects smart cards against differential power
analysis attacks. The circuit is based on a current flattening technique, is designed using a …