An inside job: Remote power analysis attacks on FPGAs

F Schellenberg, DRE Gnad, A Moradi… - IEEE Design & …, 2021 - ieeexplore.ieee.org
This article presents how programmable resources of an FPGA can be utilized to perform
side-channel attacks and reports practical examples of these attacks.-Rosario Cammarota …

A comprehensive survey on the non-invasive passive side-channel analysis

P Socha, V Miškovský, M Novotný - Sensors, 2022 - mdpi.com
Side-channel analysis has become a widely recognized threat to the security of
cryptographic implementations. Different side-channel attacks, as well as countermeasures …

Shaping the glitch: optimizing voltage fault injection attacks

C Bozzato, R Focardi, F Palmarini - IACR transactions on …, 2019 - iris.unive.it
Voltage fault injection is a powerful active side channel attack that modifies the execution-
flow of a device by creating disturbances on the power supply line. The attack typically aims …

On-Device Power Analysis Across Hardware Security Domains.: Stop Hitting Yourself.

C O'Flynn, A Dewar - IACR Transactions on Cryptographic Hardware …, 2019 - tches.iacr.org
Side-channel power analysis is a powerful method of breaking secure cryptographic
algorithms, but typically power analysis is considered to require specialized measurement …

Combined fault and DPA protection for lattice-based cryptography

D Heinz, T Pöppelmann - IEEE Transactions on Computers, 2022 - ieeexplore.ieee.org
The progress on constructing quantum computers and the ongoing standardization of post-
quantum cryptography (PQC) have led to the development and refinement of promising new …

EM analysis in the IoT context: Lessons learned from an attack on thread

D Dinu, I Kizhvatov - IACR Transactions on Cryptographic Hardware …, 2018 - tches.iacr.org
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread Page 1 EM Analysis
in the IoT Context: Lessons Learned from an Attack on Thread ∗ Daniel Dinu1 and Ilya …

Phase Modulation Side Channels: Jittery JTAG for On-Chip Voltage Measurements

C O'Flynn - IACR Transactions on Cryptographic Hardware and …, 2024 - icscm.ub.rub.de
Measuring fluctuations of the clock phase was identified as a source of leakage in early
electromagnetic side-channel investigations. Despite this, only recently was measuring the …

Preprocessing of the physical leakage information to combine side-channel distinguishers

S Seçkiner, S Köse - IEEE Transactions on Very Large Scale …, 2021 - ieeexplore.ieee.org
The security and privacy of modern computing devices have become an important design
metric with the unprecedented increase in the amount of personal information stored in the …

Sliding-window correlation attacks against encryption devices with an unstable clock

D Fledel, A Wool - Selected Areas in Cryptography–SAC 2018: 25th …, 2019 - Springer
Power analysis side channel attacks rely on aligned traces. As a counter-measure, devices
can use a jittered clock to misalign the power traces. In this paper we suggest a way to …

Side-channel attack on Rainbow post-quantum signature

D Pokorný, P Socha, M Novotný - 2021 Design, Automation & …, 2021 - ieeexplore.ieee.org
Rainbow, a layered multivariate quadratic digital signature, is a candidate for
standardization in a competition-like process organized by NIST. In this paper, we present a …