Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2 Hits in 2.0 sec

Side Channel Analysis against the ANSSI's protected AES implementation on ARM [article]

Loïc Masure, Rémi Strullu
2021 IACR Cryptology ePrint Archive  
In 2019, the ANSSI released a protected software implementation of AES running on an STM32 platform with ARM Cortex-M architecture, publicly available on Github.  ...  Along with the dataset, we also provide a benchmark of deep learning based side-channel attacks, thereby extending the works of Bronchain et al.  ...  Acknowledgements The authors would like to thank the LSC team from ANSSI for their fruitful help with the target implementation.  ... 
dblp:journals/iacr/MasureS21 fatcat:3ik4bjy6mbduri37jpdifzd6tu

Don't Learn What You Already Know: Grey-Box Modeling for Profiling Side-Channel Analysis against Masking [article]

Loïc Masure, Valence Cristiani, Maxime Lecomte, François-Xavier Standaert
2022 IACR Cryptology ePrint Archive  
However, the recent works of Bronchain and Standaert at Tches 2020 questioned the soundness of such tools if used in a black-box setting to evaluate implementations protected with higher-order masking.  ...  Over the past few years, deep-learning-based attacks have emerged as a de facto standard, thanks to their ability to break implementations of cryptographic primitives without pre-processing, even against  ...  This work has been funded in part by the ERC project number 724725 (acronym SWORD).  ... 
dblp:journals/iacr/MasureCLS22 fatcat:jkuk2r2evfanjc7gbn32knxgmq