Side-channel analysis and countermeasure design for implementation of Curve448 on cortex-M4

M Bisheh-Niasar, M Anastasova, A Abdulgadir… - Proceedings of the 11th …, 2022 - dl.acm.org
The highly secure Curve448 cryptographic algorithm has been recently recommended by
NIST. While this algorithm provides 224-bit security over elliptic curve cryptography, its …

Combined fault and DPA protection for lattice-based cryptography

D Heinz, T Pöppelmann - IEEE Transactions on Computers, 2022 - ieeexplore.ieee.org
The progress on constructing quantum computers and the ongoing standardization of post-
quantum cryptography (PQC) have led to the development and refinement of promising new …

Error-correction coding using polynomial residue number system

IA Kalmykov, VP Pashintsev, KT Tyncherov… - Applied Sciences, 2022 - mdpi.com
There has been a tendency to use the theory of finite Galois fields, or GF (2n), in
cryptographic ciphers (AES, Kuznyechik) and digital signal processing (DSP) systems. It is …

Improved hybrid approach for side-channel analysis using efficient convolutional neural network and dimensionality reduction

N Mukhtar, AP Fournaris, TM Khan… - IEEE …, 2020 - ieeexplore.ieee.org
Deep learning-based side channel attacks are burgeoning due to their better efficiency and
performance, suppressing the traditional side-channel analysis. To launch the successful …

Profiling dilithium digital signature traces for correlation differential side channel attacks

AP Fournaris, C Dimopoulos, O Koufopavlou - … Conference on Embedded …, 2020 - Springer
A significant concern for the candidate schemes of the NIST postquantum cryptography
standardization project is the protection they support against side-channel attacks. One of …

SCA-secure ECC in software–mission impossible?

L Batina, Ł Chmielewski, B Haase, N Samwel… - Cryptology ePrint …, 2021 - eprint.iacr.org
This paper describes an ECC implementation computing the X25519 keyexchange protocol
on the Arm Cortex-M4 microcontroller. For providing protections against various side …

An efficient multi-parameter approach for FPGA hardware Trojan detection

AP Fournaris, L Pyrgas, P Kitsos - Microprocessors and Microsystems, 2019 - Elsevier
Hardware Trojan (HT) detection in the wild is a challenging endeavor since the inspector
cannot have access to “golden chips” or special and trusted test measurements in order to …

Cicada: A framework for private non-interactive on-chain auctions and voting

N Glaeser, IA Seres, M Zhu, J Bonneau - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Auction and voting schemes play a crucial role in the Web3 ecosystem. Yet currently
deployed implementations either lack privacy or require at least two rounds, hindering …

Spread Spectrum-Based Countermeasures for Cryptographic RISC-V SoC

TH Tran, BA Dao, DH Le, VP Hoang… - … Transactions on Very …, 2024 - ieeexplore.ieee.org
Side-channel analysis attacks have become the primary method for exploiting the
vulnerabilities of cryptographic devices. Therefore, focusing on countermeasures to …

[PDF][PDF] SoK: SCA-secure ECC in software–mission impossible?

L Batina, LM Chmielewski, B Haase, N Samwel… - 2023 - repository.ubn.ru.nl
This paper describes an ECC implementation computing the X25519 keyexchange protocol
on the Arm Cortex-M4 microcontroller. For providing protections against various side …