Analysis and improvements of the DPA contest v4 implementation

S Bhasin, N Bruneau, JL Danger, S Guilley… - Security, Privacy, and …, 2014 - Springer
DPA Contest is an international framework which allows researchers to compare their
attacks under a common setting. The latest version of DPA Contest proposes a software …

Cryptography and Embedded Systems Security

X Hou, J Breier - Springer, 2024 - Springer
Cryptography is an indispensable tool used to protect information in computing systems.
Billions of people all over the world use it in their daily lives without even noticing there is …

Side-Channel Analysis Attacks and Countermeasures

X Hou, J Breier - Cryptography and Embedded Systems Security, 2024 - Springer
Side-channel analysis attacks target cryptographic implementations passively. The attacks
exploit the possibility of the attacker observing the physical characteristics of a device that is …

Feeding two cats with one bowl: On designing a fault and side-channel resistant software encoding scheme

J Breier, X Hou - Topics in Cryptology–CT-RSA 2017: The …, 2017 - Springer
When it comes to side-channel countermeasures, software encoding schemes are
becoming popular and provide a good level of security for general-purpose microcontrollers …

On evaluating fault resilient encoding schemes in software

J Breier, X Hou, Y Liu - IEEE Transactions on Dependable and …, 2019 - ieeexplore.ieee.org
Cryptographic implementations are often vulnerable against physical attacks, fault injection
analysis being among the most popular techniques. On par with development of attacks, the …

Study of a novel software constant weight implementation

V Servant, N Debande, H Maghrebi… - Smart Card Research and …, 2015 - Springer
While in the early 2000's lots of research was focused on Differential Power Analysis of first
and second-order, it seems the recent trend is of even higher-order. As this order grows …

The other side of the coin: Analyzing software encoding schemes against fault injection attacks

J Breier, D Jap, S Bhasin - 2016 IEEE International Symposium …, 2016 - ieeexplore.ieee.org
The versatility and cost of embedded systems have made it ubiquitous. Such wide-
application exposes an embedded system to a variety of physical threats like side-channel …

High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers

K Papapagiannopoulos - … Identification: Security and Privacy Issues: 10th …, 2014 - Springer
This paper presents high-throughput assembly implementations of PRESENT, PRINCE and
KATAN64 ciphers for the ATtiny family of AVR microcontrollers. We report new throughput …

A study on analyzing side-channel resistant encoding schemes with respect to fault attacks

J Breier, D Jap, S Bhasin - Journal of Cryptographic Engineering, 2017 - Springer
Recently, several software encoding countermeasures were proposed, utilizing the side-
channel hiding concept for software implementations. While these schemes aim to protect …

Smart security management in secure devices

B Robisson, M Agoyan, P Soquet, S Le-Henaff… - Journal of Cryptographic …, 2017 - Springer
Among other threats, secure components are subjected to physical attacks whose aim is to
recover the secret information they store. Most of the work carried out to protect these …