Rosita: Towards automatic elimination of power-analysis leakage in ciphers

MA Shelton, N Samwel, L Batina, F Regazzoni… - arXiv preprint arXiv …, 2019 - arxiv.org
Since their introduction over two decades ago, side-channel attacks have presented a
serious security threat. While many ciphers' implementations employ masking techniques to …

Power Side-channel Attack Resistant Circuit Designs of ARX Ciphers Using High-level Synthesis

S Inagaki, M Yang, Y Li, K Sakiyama… - ACM Transactions on …, 2023 - dl.acm.org
In the Internet of Things (IoT) era, edge devices have been considerably diversified and are
often designed using high-level synthesis (HLS) for improved design productivity. However …

On comparing side-channel properties of AES and ChaCha20 on microcontrollers

Z Najm, D Jap, B Jungk, S Picek… - 2018 IEEE Asia Pacific …, 2018 - ieeexplore.ieee.org
Side-channel attacks are a real threat to many secure systems. In this paper, we consider
two ciphers used in the automotive industry-AES and ChaCha20 and we evaluate their …

ARMISTICE: Microarchitectural leakage modeling for masked software formal verification

A De Grandmaison, K Heydemann… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Side-channel attacks are powerful attacks for retrieving secret data by exploiting physical
measurements, such as power consumption or electromagnetic emissions. Masking is a …

[PDF][PDF] Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency

B Gigerl, F Klug, S Mangard… - IACR Transactions …, 2023 - graz.elsevierpure.com
Cryptographic devices in hostile environments can be vulnerable to physical attacks such as
power analysis. Masking is a popular countermeasure against such attacks, which works by …

Leakageverif: Scalable and efficient leakage verification in symbolic expressions

QL Meunier, E Pons, K Heydemann - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Side-channel attacks are a powerful class of attacks targeting cryptographic devices.
Masking is a popular protection technique to thwart such attacks as it can be theoretically …

An analytic attack against ARX addition exploiting standard side-channel leakage

Y Yan, E Oswald, S Vivek - Cryptology ePrint Archive, 2020 - eprint.iacr.org
In the last few years a new design paradigm, the so-called ARX (modular addition, rotation,
exclusive-or) ciphers, have gained popularity in part because of their non-linear operation's …

[PDF][PDF] An Anti-Physical Attack Scheme of ARX Lightweight Algorithms for IoT Applications.

Q Zhi, X Jiang, H Zhang, Z Zhou, J Ren… - Comput. Syst. Sci …, 2023 - researchgate.net
(ARX) operation has attracted much attention due to its high software affinity and fast
operation speed. However, lacking an effective defense scheme for physical attacks limits …

Constructing TI-friendly substitution boxes using shift-invariant permutations

S Gao, A Roy, E Oswald - Topics in Cryptology–CT-RSA 2019: The …, 2019 - Springer
The threat posed by side channels requires ciphers that can be efficiently protected in both
software and hardware against such attacks. In this paper, we proposed a novel Sbox …

Implementation vulnerability analysis: A case study on Chacha of SPHINCS

V Satheesh, D Shanmugam - 2020 IEEE international …, 2020 - ieeexplore.ieee.org
Deployment of Post Quantum Cryptography (PQC) primitives ensures forward secrecy for
today's communication against tomorrow's quantum adversary. However, these primitives …