Recent advances in deep learning‐based side‐channel analysis

S Jin, S Kim, HS Kim, S Hong - Etri Journal, 2020 - Wiley Online Library
As side‐channel analysis and machine learning algorithms share the same objective of
classifying data, numerous studies have been proposed for adapting machine learning to …

Applications of machine learning techniques in side-channel attacks: a survey

B Hettwer, S Gehrer, T Güneysu - Journal of Cryptographic Engineering, 2020 - Springer
With increasing expansion of the Internet of Things, embedded devices equipped with
cryptographic modules become an important factor to protect sensitive data. Even though …

Applying horizontal clustering side-channel attacks on embedded ECC implementations

E Nascimento, Ł Chmielewski - … Conference on Smart Card Research and …, 2017 - Springer
Side-channel attacks are a threat to cryptographic algorithms running on embedded
devices. Public-key cryptosystems, including elliptic curve cryptography (ECC), are …

Survey for performance & security problems of passive side-channel attacks countermeasures in ECC

R Abarzúa, C Valencia, J López - Cryptology ePrint Archive, 2019 - eprint.iacr.org
The main objective of the Internet of Things is to interconnect everything around us to obtain
information which was unavailable to us before, thus enabling us to make better decisions …

Enhancing dimensionality reduction methods for side-channel attacks

E Cagli, C Dumas, E Prouff - … 2015, Bochum, Germany, November 4-6 …, 2016 - Springer
Abstract Advanced Side-Channel Analyses make use of dimensionality reduction
techniques to reduce both the memory and timing complexity of the attacks. The most …

Non-Profiled Unsupervised Horizontal Iterative Attack against Hardware Elliptic Curve Scalar Multiplication Using Machine Learning

M Aftowicz, I Kabin, Z Dyka, P Langendörfer - Future Internet, 2024 - mdpi.com
While IoT technology makes industries, cities, and homes smarter, it also opens the door to
security risks. With the right equipment and physical access to the devices, the attacker can …

Your rails cannot hide from localized EM: How dual-rail logic fails on FPGAs

V Immler, R Specht, F Unterstein - … Taipei, Taiwan, September 25-28, 2017 …, 2017 - Springer
Protecting cryptographic implementations against side-channel attacks is a must to prevent
leakage of processed secrets. As a cell-level countermeasure, so called DPA-resistant logic …

Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages

C Andrikos, L Batina, L Chmielewski, L Lerman… - Advances in Cryptology …, 2019 - Springer
Near-field microprobes have the capability to isolate small regions of a chip surface and
enable precise measurements with high spatial resolution. Being able to distinguish the …

Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of cortex-M4 SIKE

A Genêt, N Kaluđerović - … on Constructive Side-Channel Analysis and …, 2022 - Springer
In this paper, the recommended implementation of the post-quantum key exchange SIKE for
Cortex-M4 is attacked through power analysis with a single trace by clustering with the k …

Survey on performance and security problems of countermeasures for passive side-channel attacks on ECC

R Abarzúa, C Valencia, J Lopez - Journal of Cryptographic Engineering, 2021 - Springer
This paper presents an analysis on the state of the art of several proposals for algorithmic
countermeasures to prevent passive side-channel attacks (SCA) on elliptic curve …