Efficient, portable template attacks

MO Choudary, MG Kuhn - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
Template attacks recover data values processed by tamper-resistant devices from side-
channel waveforms, such as supply-current fluctuations (power analysis) or electromagnetic …

An energy trace compression method for differential power analysis attack

X Cai, R Li, S Kuang, J Tan - IEEE Access, 2020 - ieeexplore.ieee.org
Differential power analysis attacks are the most commonly used means to break
cryptographic devices within the side-channel attack technology. Since there is a lot of noise …

Cryptanalysis of a chaotic block cryptographic system against template attacks

Y Luo, S Zhang, J Liu, L Cao - International Journal of Bifurcation …, 2020 - World Scientific
The security of chaotic cryptographic system can be theoretically evaluated by using
conventional statistical tests and numerical simulations, such as the character frequency …

On the power of template attacks in highly multivariate context

M Ouladj, N El Mrabet, S Guilley, P Guillot… - Journal of Cryptographic …, 2020 - Springer
When implemented in software (or hardware), a cryptographic protocol can leak sensitive
information during its execution. Side-channel attacks can use those leakages in order to …

On the exact relationship between the success rate of template attack and different parameters

H Zhang - IEEE Transactions on Information Forensics and …, 2019 - ieeexplore.ieee.org
In practice, the Template Attack (TA) is widely accepted as the strongest side channel attack,
and it is used to evaluate the physical security of crypto devices in practice. In TA, different …

A modular and optimized toolbox for side-channel analysis

AF Rodríguez, LH Encinas, AM Muñoz… - IEEE Access, 2019 - ieeexplore.ieee.org
The aim of this paper is to describe the characteristics of a toolbox developed to carry out a
side-channel analysis of cryptosystems implemented in physical devices. The toolbox …

A lightweight detection algorithm for collision-optimized divide-and-conquer attacks

C Ou, SK Lam, C Zhou, G Jiang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
By introducing collision information into divide-and-conquer attacks, several existing works
transform the original candidate space, which may be too large to enumerate, into a …

A novel side-channel analysis for physical-domain security in cyber-physical systems

M Wang, K Huang, Y Wang, Z Wu… - International Journal of …, 2019 - journals.sagepub.com
Security of cyber-physical systems against cyber attacks is an important yet challenging
problem. Cyber-physical systems are prone to information leakage from the physical …

面向AES 密码硬件系统的马氏距离随机旁路攻击方法

张顺生, 罗玉玲, 丘森辉 - 《 广西师范大学学报》(自然科学版), 2021 - gxsf.magtech.com.cn
随机模型是一种典型的有原型攻击, 其所构建模板的协方差矩阵和传统模板攻击一样,
可能会出现指数运算溢出和协方差矩阵不可逆的问题. 此外, 它需要控制参考设备多次随机设置 …

Template Attacks Based on the Multivariate Joint Distribution

M Yang, Q Meng, A Wang, X Liu - Cryptology ePrint Archive, 2020 - eprint.iacr.org
For template attacks, it is ideal if templates can be built for each (data, key) pair. However, it
requires a lot of power traces and computation. In this paper, firstly, the properties of the …