Cryptographic Hardware and Embedded Systems - CHES 2004

From MaRDI portal
Publication:5311440

DOI10.1007/b99451zbMath1104.68467OpenAlexW2491896407MaRDI QIDQ5311440

Christophe Clavier, Éric Brier, Francis Olivier

Publication date: 23 August 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b99451




Related Items (98)

Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \)Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended versionSide-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser SensorBlack-Box Side-Channel Attacks Highlight the Importance of CountermeasuresPower Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMsA First-Order Leak-Free Masking CountermeasureTowards Different Flavors of Combined Side Channel AttacksA New Difference Method for Side-Channel Analysis with High-Dimensional Leakage ModelsGetting More from PCA: First Results of Using Principal Component Analysis for Extensive Power AnalysisTowards tight random probing securityFederated learning in side-channel analysisCorrelation power analysis and higher-order masking implementation of WAGEOn the influence of optimizers in deep learning-based side-channel analysisOnline Template Attack on ECDSA:When Similarities Among Devices are Taken for Granted: Another Look at PortabilityDifferential power analysis of stream ciphers with LFSRsMultivariate Leakage Model for Improving Non-profiling DPA on Noisy Power TracesScore-Based vs. Probability-Based Enumeration – A Cautionary NoteGeneralizing statistical ineffective fault attacks in the spirit of side-channel attacksProtecting secure ICs against side-channel attacks by identifying and quantifying potential EM and leakage hotspots at simulation stageFull key recovery side-channel attack against ephemeral SIKE on the cortex-M4Transparency order of \((n, m)\)-functions -- its further characterization and applicationsConstructing $8$-bit permutations, $8$-bit involutions and $8$-bit orthomorphisms with almost optimal cryptographic parametersEnabling 3-Share Threshold Implementations for all 4-Bit S-BoxesEnabling cloud storage auditing with key-exposure resilience under continual key-leakageAES side-channel countermeasure using random tower field constructionsSecure GCM implementation on AVRSM4 Chaotic Masking Scheme Against Power Analysis Based on FPGACryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power AnalysisOn Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert LeakagesBoosting Higher-Order Correlation Attacks by Dimensionality ReductionRevisiting mutual information analysis: multidimensionality, neural estimation and optimality proofsThe distributions of individual bits in the output of multiplicative operationsHorizontal collision correlation attack on elliptic curvesComplete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacksProvable secure software masking in the real-worldFault Attacks on Public Key Elements: Application to DLP-Based SchemesCharacterisation and Estimation of the Key Rank Distribution in the Context of Side Channel EvaluationsA Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is NotHigher-order masking scheme for Trivium hardware implementationOn the exact relationship between the mutual information metric and the success rate metricPAC privacy: automatic privacy measurement and control of data processingImproving first-order threshold implementations of \textsf{SKINNY}A new key recovery side-channel attack on HQC with chosen ciphertextDetecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacksBridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histogramsAttacking embedded ECC implementations through CMOV side channelsLearning with physical rounding for linear and quadratic leakage functionsFirst-order side channel attacks on Zhang's countermeasuresPolar differential power attacks and evaluationA Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel AttacksTwo improved multiple-differential collision attacksMutual information analysis: a comprehensive studySide-channel resistant crypto for less than 2,300 GESliding-window correlation attacks against encryption devices with an unstable clockProfiled power analysis attacks using convolutional neural networks with domain knowledgeOn the Use of Independent Component Analysis to Denoise Side-Channel MeasurementsSCATTER: A New Dimension in Side-ChannelQuadrivariate Improved Blind Side-Channel Analysis on Boolean Masked AESCryptanalysis of a Chaotic Block Cryptographic System Against Template AttacksA new birthday-type algorithm for attacking the fresh re-keying countermeasureWhite-Box Cryptography in the Gray BoxThere Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel AttacksМаскирование ГОСТ 28147-89 для защиты от атак по побочным каналамMontgomery’s Trick and Fast Implementation of Masked AESCategorising and comparing cluster-based DPA distinguishersRedefining the transparency orderOn the optimality and practicability of mutual information analysis in some scenariosMultivariate high-order attacks of shuffled tables recomputationCombined Attack on CRT-RSACodes for Side-Channel Attacks and ProtectionsSpectral Approach for Correlation Power AnalysisWhite-box cryptography: don't forget about grey-box attacksMaking masking security proofs concrete (or how to evaluate the security of any leaking device), extended versionOn the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping SchemeA Note on the Use of Margins to Compare DistinguishersChipWhisperer: An Open-Source Platform for Hardware Embedded Security ResearchOn the Security of RSM - Presenting 5 First- and Second-Order AttacksPower Analysis for Secret Recovering and Reverse Engineering of Public Key AlgorithmsPolynomial Evaluation and Side Channel AnalysisA Heuristic Approach to Assist Side Channel Analysis of the Data Encryption StandardImproving Differential Power Analysis by Elastic AlignmentNear Collision Side Channel AttacksFault Analysis Attack against an AES Prototype Chip Using RSLImproving DPA by Peak Distribution AnalysisAffine Masking against Higher-Order Side Channel AnalysisRandom Order m-ary ExponentiationMultivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic ApplicationsCorrelation Power Analysis of Lightweight Block Ciphers: From Theory to PracticeOn the Exact Success Rate of Side Channel Analysis in the Gaussian ModelDistinguishing Multiplications from Squaring OperationsPKDPA: An Enhanced Probabilistic Differential Power Attack MethodologyFormal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel AttacksFuzzy matching template attacks on multivariate cryptography: a case study\textsf{Scatter}: a missing case?Augmenting leakage detection using bootstrappingOn the implementation efficiency of linear regression-based side-channel attacksCustom instruction support for modular defense against side-channel and fault attacks




This page was built for publication: Cryptographic Hardware and Embedded Systems - CHES 2004