138 Result(s)
-
Article
Toward finding best linear codes for side-channel protections (extended version)
Side-channel attacks aim at extracting secret keys from cryptographic devices. Randomly masking the implementation is a provable way to protect the secrets against this threat. Recently, various masking scheme...
-
Chapter and Conference Paper
Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2
Cryptographic hashing with secret key is widely used for message authentication, e.g., in the popular HMAC protocol. This algorithm is a suitable target for vertical Side-Channel Analyses. In practice, such analy...
-
Chapter and Conference Paper
From Substitution Box to Threshold
With the escalating demand for lightweight ciphers as well as side channel protected implementation of those ciphers in recent times, this work focuses on two related aspects. First, we present a tool for auto...
-
Chapter and Conference Paper
Impact of Process Mismatch and Device Aging on SR-Latch Based True Random Number Generators
The True Random Number Generator (TRNG) is an inescapable primitive for security and cryptographic functions. A common TRNG architecture in digital devices exploits the noise jitter accumulation with ring osci...
-
Article
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost
In the attacker models of side-channel attacks (SCA) and fault injection attacks (FIA), the opponent has access to a noisy version of the internal behavior of the hardware. Since the end of the nineties, many ...
-
Chapter and Conference Paper
Reliability of Ring Oscillator PUFs with Reduced Helper Data
Enhancing the reliability of natively unstable Physically Unclonable Functions (PUFs) is a major requirement when the PUF is to generate secret identifiers like cryptographic keys. One traditional method is to...
-
Chapter and Conference Paper
Removing the Field Size Loss from Duc et al.’s Conjectured Bound for Masked Encodings
At Eurocrypt 2015, Duc et al. conjectured that the success rate of a side-channel attack targeting an intermediate computation encoded in a linear secret-sharing, a.k.a. masking with
-
Article
Cross-PUF Attacks: Targeting FPGA Implementation of Arbiter-PUFs
The hardware primitives known as Physically Unclonable Functions (PUFs) generate unique signatures based on uncontrollable variations which occur during the manufacturing process of silicon chips. These signat...
-
Article
Spectral approach to process the (multivariate) high-order template attack against any masking scheme
Cryptographic software is particularly vulnerable to side-channel attacks when programmed in embedded devices. Indeed, the leakage is particularly intense compared to the noise level, making it mandatory for t...
-
Chapter and Conference Paper
Profiled Side-Channel Analysis in the Efficient Attacker Framework
Profiled side-channel attacks represent the most powerful category of side-channel attacks. There, the attacker has access to a clone device to profile its leaking behavior. Additionally, it is common to consi...
-
Chapter and Conference Paper
An Embedded AI-Based Smart Intrusion Detection System for Edge-to-Cloud Systems
This article proposes a general purpose IoT framework usually applicable to all Edge-to-Cloud applications and provides an evaluation study on a use-case involving automotive V2X architecture, tested and verif...
-
Article
Reducing Aging Impacts in Digital Sensors via Run-Time Calibration
Hazards or intentional perturbations must be identified in safety- and security-critical applications. Digital sensors have been shown to be an appealing approach to detect such abnormalities. However, as any ...
-
Article
Categorizing all linear codes of IPM over \({\mathbb {F}}_{2^{8}}\)
Inner Product Masking (IPM) is a generalization of several masking schemes including the Boolean one to protect cryptographic implementation against side-channel analysis. The core competitiveness of IPM is th...
-
Article
Detecting faults in inner product masking scheme
Side-channel analysis and fault injection attacks are two typical threats to cryptographic implementations, especially in modern embedded devices. Thus, there is an insistent demand for dual side-channel and f...
-
Article
End-to-end automated cache-timing attack driven by machine learning
Cache-timing attacks are serious security threats that exploit cache memories to steal secret information. We believe that the identification of a sequence of function calls from cache-timing data measurements...
-
Chapter and Conference Paper
Correction to: Side-Channel Analysis of CRYSTALS-Kyber and A Novel Low-Cost Countermeasure
In the originally published chapter 3 the first and last name order of one of the authors was incorrect. The author’s name has been corrected as “Bel Korchi, Amina”.
-
Chapter and Conference Paper
Industrial Cyber Security at the Network Edge: The BRAINE Project Approach
This work presents the BRAINE Project approaches and solutions to enable AI-empowered industrial applications to efficiently and securely operate at the network edge. First, two use cases are presented to high...
-
Chapter
General Introduction
Today’s digital era connects everyone and everything in between through the Internet of Things (IoTs). That situation leads to an omnipresence of embedded systems in our daily life endowed with integrated capa...
-
Chapter
Spectral Approach to Speed up the Processing
We provide hereafter the definition of the Walsh-Hadamard transform.
-
Chapter
Foundations of Side-Channel Attacks
Let us first adopt some useful notations that will hold for the remainder of the book.