A side-channel attack on a bitsliced higher-order masked CRYSTALS-Kyber implementation

R Wang, M Brisfors, E Dubrova - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In response to side-channel attacks on masked implementations of post-quantum
cryptographic algorithms, a new bitsliced higher-order masked implementation of …

Estranet: An efficient shift-invariant transformer network for side-channel analysis

S Hajra, S Chowdhury… - IACR Transactions on …, 2024 - tches.iacr.org
Abstract Deep Learning (DL) based Side-Channel Analysis (SCA) has been extremely
popular recently. DL-based SCA can easily break implementations protected by masking …

Acnn: arbitrary trace attacks based on leakage area detection

C Xiao, M Tang - International Journal of Information Security, 2024 - Springer
Abstract Deep Learning-based Side-Channel Analysis (DL-SCA) has emerged as a
powerful method in the field of side-channel analysis. Current works on DL-SCA primarily …

A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation

R Wang, M Brisfors, E Dubrova - International Conference on Applied …, 2024 - Springer
In response to side-channel attacks on masked implementations of post-quantum
cryptographic algorithms, a new bitsliced higher-order masked implementation of …

Shift-invariance Robustness of Convolutional Neural Networks in Side-channel Analysis

M Krček, L Wu, G Perin, S Picek - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Convolutional neural networks (CNNs) offer unrivaled performance in profiling side-channel
analysis. This claim is corroborated by numerous results where CNNs break targets …

CPSGD: A Novel Optimization Algorithm and Its Application in Side-Channel Analysis

Y Zhang, D Zhao, H Li, C Pan - Mathematics, 2024 - search.proquest.com
In recent years, side-channel analysis based on deep learning has garnered significant
attention from researchers. A pivotal reason for this lies in the fact that deep learning-based …

HierNet: A Hierarchical Deep Learning Model for SCA on Long Traces

S Hajra, D Mukhopadhyay - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Side-channel analysis (SCA) compromises the security of cryptographic devices by
exploiting various side-channel leakages such as power consumption, electromagnetic (EM) …

Bridging Deep Learning and Classical Profiled Side-Channel Attacks

G Zaid - 2021 - theses.hal.science
Through this thesis, supervised by the Hubert-Curien Laboratory and the Thales ITSEF, we
look for getting better intuitions about the suitability of deep learning techniques to perform …