Power analysis attack: an approach based on machine learning

L Lerman, G Bontempi… - International Journal of …, 2014 - inderscienceonline.com
In cryptography, a side-channel attack is any attack based on the analysis of measurements
related to the physical implementation of a cryptosystem. Nowadays, the possibility of …

Statistical tools flavor side-channel collision attacks

A Moradi - Annual International Conference on the Theory and …, 2012 - Springer
By examining the similarity of side-channel leakages, collision attacks evade the
indispensable hypothetical leakage models of multi-query based side-channel …

Understanding security failures of anonymous authentication schemes for cloud environments

M Xu, D Wang, Q Wang, Q Jia - Journal of Systems Architecture, 2021 - Elsevier
Currently, password-based remote authentication mechanism has become an essential
procedure to ensure users access the resources of the cloud server securely. Dozens of …

Robust smart card based password authentication scheme against smart card security breach

D Wang, P Wang, C Ma, Z Chen - Cryptology ePrint Archive, 2012 - eprint.iacr.org
As the most prevailing two-factor authentication mechanism, smart card based password
authentication has been a subject of intensive research in the past decade and hundreds of …

A reliable lightweight two factor mutual authenticated session key agreement protocol for multi-server environment

S Shunmuganathan - Wireless Personal Communications, 2021 - Springer
Today's hyper-connected digital environment makes two-way authentication and secured
key agreement a fundamental requirement for a secure connection. The research …

Second-order side-channel analysis based on orthogonal transform nonlinear regression

Z Jiang, Q Ding - Entropy, 2023 - mdpi.com
In recent years, side-channel analysis technology has been one of the greatest threats to
information security. SCA decrypts the key information in the encryption device by …

SCARE of secret ciphers with SPN structures

M Rivain, T Roche - International Conference on the Theory and …, 2013 - Springer
Abstract Side-Channel Analysis (SCA) is commonly used to recover secret keys involved in
the implementation of publicly known cryptographic algorithms. On the other hand, Side …

Adaptive chosen-plaintext collision attack on masked AES in edge computing

Y Ding, Y Shi, A Wang, X Zheng, Z Wang… - IEEE Access, 2019 - ieeexplore.ieee.org
Edge computing handles delay-sensitive data and provides real-time feedback, while it
brings data security issues to edge devices (such as IoT devices and edge servers). Side …

Unified and optimized linear collision attacks and their application in a non-profiled setting

B Gérard, FX Standaert - International Workshop on Cryptographic …, 2012 - Springer
Side-channel collision attacks are one of the most investigated techniques allowing the
combination of mathematical and physical cryptanalysis. In this paper, we discuss their …

Efficient Multi-Byte Power Analysis Architecture Focusing on Bitwise Linear Leakage

Z Jiang, Q Ding, A Wang - ACM Transactions on Embedded Computing …, 2024 - dl.acm.org
As the most commonly used side-channel analysis method, Correlation Power Analysis
(CPA) usually uses the divide-and-conquer strategy to guess the single-byte key in the …