A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Side Channel Analysis against the ANSSI's protected AES implementation on ARM
[article]
2021
IACR Cryptology ePrint Archive
In 2019, the ANSSI released a protected software implementation of AES running on an STM32 platform with ARM Cortex-M architecture, publicly available on Github. ...
Along with the dataset, we also provide a benchmark of deep learning based side-channel attacks, thereby extending the works of Bronchain et al. ...
Acknowledgements The authors would like to thank the LSC team from ANSSI for their fruitful help with the target implementation. ...
dblp:journals/iacr/MasureS21
fatcat:3ik4bjy6mbduri37jpdifzd6tu
Don't Learn What You Already Know: Grey-Box Modeling for Profiling Side-Channel Analysis against Masking
[article]
2022
IACR Cryptology ePrint Archive
However, the recent works of Bronchain and Standaert at Tches 2020 questioned the soundness of such tools if used in a black-box setting to evaluate implementations protected with higher-order masking. ...
Over the past few years, deep-learning-based attacks have emerged as a de facto standard, thanks to their ability to break implementations of cryptographic primitives without pre-processing, even against ...
This work has been funded in part by the ERC project number 724725 (acronym SWORD). ...
dblp:journals/iacr/MasureCLS22
fatcat:jkuk2r2evfanjc7gbn32knxgmq