Abstract
No abstract available.
Cited By
- Ninan M, Nimmo E, Reilly S, Smith C, Sun W, Wang B and Emmert J A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses, (630-643)
- Schloyer P, Knauer P, Bauer B and Merli D Automating Side-Channel Testing for Embedded Systems: A Continuous Integration Approach Proceedings of the 19th International Conference on Availability, Reliability and Security, (1-6)
- Jin S, Xu M and Cai Y Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, (1405-1414)
- Nair M, Sadhukhan R, Pearce H, Mukhopadhyay D and Karri R Netlist Whisperer: AI and NLP Fight Circuit Leakage! Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, (83-92)
- Singh A and Gerdes R Better Side-Channel Attacks Through Measurements Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, (15-26)
- Picek S, Perin G, Mariot L, Wu L and Batina L (2022). SoK: Deep Learning-based Physical Side-channel Analysis, ACM Computing Surveys, 55:11, (1-35), Online publication date: 30-Nov-2023.
- Tran T, Dao B, Hoang T, Hoang V and Pham C (2023). Transition Factors of Power Consumption Models for CPA Attacks on Cryptographic RISC-V SoC, IEEE Transactions on Computers, 72:9, (2689-2700), Online publication date: 1-Sep-2023.
- Morel L, Couroussé D and Hiscock T (2022). Code Polymorphism Meets Code Encryption: Confidentiality and Side-channel Protection of Software Components, Digital Threats: Research and Practice, 4:2, (1-27), Online publication date: 30-Jun-2023.
- Mahmoud D, Lenders V and Stojilović M (2022). Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era, ACM Computing Surveys, 55:3, (1-40), Online publication date: 30-Apr-2023.
- Cohen Y, Tharayil K, Haenel A, Genkin D, Keromytis A, Oren Y and Yarom Y HammerScope Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (547-561)
- Liu C, Chakraborty A, Chawla N and Roggel N Frequency Throttling Side-Channel Attack Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (1977-1991)
- Dhooghe S, Shahmirzadi A and Moradi A Second-Order Low-Randomness d + 1 Hardware Sharing of the AES Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (815-828)
- Nassi B, Pirutin Y, Shams J, Swissa R, Elovici Y and Zadov B (2022). Optical Speech Recovery From Desktop Speakers, Computer, 55:11, (40-51), Online publication date: 1-Nov-2022.
- Pham D, Marion D and Heuser A ULTRA: Ultimate Rootkit Detection over the Air Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses, (232-251)
- Baksi A, Kumar S and Sarkar S (2022). A New Approach for Side Channel Analysis on Stream Ciphers and Related Constructions, IEEE Transactions on Computers, 71:10, (2527-2537), Online publication date: 1-Oct-2022.
- Dubey A, Cammarota R, Suresh V and Aysu A (2022). Guarding Machine Learning Hardware Against Physical Side-channel Attacks, ACM Journal on Emerging Technologies in Computing Systems, 18:3, (1-31), Online publication date: 31-Jul-2022.
- Chuengsatiansup C, Wagner M and Yarom Y Opportunities for genetic improvement of cryptographic code Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1928-1929)
- Calhoun A, Ortega E, Yaman F, Dubey A and Aysu A Hands-On Teaching of Hardware Security for Machine Learning Proceedings of the Great Lakes Symposium on VLSI 2022, (455-461)
- Golder A, Bhat A and Raychowdhury A Exploration into the Explainability of Neural Network Models for Power Side-Channel Analysis Proceedings of the Great Lakes Symposium on VLSI 2022, (59-64)
- Xu T, Cheng G and Fei Y Protected ECC Still Leaks: A Novel Differential-Bit Side-channel Power Attack on ECDH and Countermeasures Proceedings of the Great Lakes Symposium on VLSI 2022, (9-14)
- Spence A and Bangay S (2022). Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures, International Journal of Information Security, 21:3, (437-453), Online publication date: 1-Jun-2022.
- Barenghi A, Carrera D, Mella S, Pace A, Pelosi G and Susella R (2022). Profiled side channel attacks against the RSA cryptosystem using neural networks, Journal of Information Security and Applications, 66:C, Online publication date: 1-May-2022.
- Brosch M, Probst M and Sigl G Counteract side-channel analysis of neural networks by shuffling Proceedings of the 2022 Conference & Exhibition on Design, Automation & Test in Europe, (1305-1310)
- Schönstedt M, Brasser F, Jauernig P, Stapf E and Sadeghi A SafeTEE Proceedings of the 2022 Conference & Exhibition on Design, Automation & Test in Europe, (520-525)
- Ege B, Eisenbarth T and Batina L Near Collision Side Channel Attacks Selected Areas in Cryptography – SAC 2015, (277-292)
- Chen Q, Zhao D, Liu L, Yan X, Yuan Y, Zhang X, Wu H and Wang Z (2022). Side-channel information leakage analysis and countermeasures in an embedded CPU microarchitecture, Computer Standards & Interfaces, 80:C, Online publication date: 1-Mar-2022.
- Fan X, Tong J, Li Y, Duan X, Ren Y and Babaie S (2022). Power Analysis Attack Based on Hamming Weight Model without Brute Force Cracking, Security and Communication Networks, 2022, Online publication date: 1-Jan-2022.
- Lee J, Kim J, Han D and Cao Y (2022). Novel Shuffling Countermeasure for Advanced Encryption Standard (AES) against Profiled Attack in Mobile Multimedia Services, Wireless Communications & Mobile Computing, 2022, Online publication date: 1-Jan-2022.
- Hou X, Breier J and Bhasin S (2022). SBCMA: Semi-Blind Combined Middle-Round Attack on Bit-Permutation Ciphers With Application to AEAD Schemes, IEEE Transactions on Information Forensics and Security, 17, (3677-3690), Online publication date: 1-Jan-2022.
- Paguada S, Batina L, Buhan I and Armendariz I (2022). Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel Profiled Attacks, IEEE Transactions on Information Forensics and Security, 17, (2835-2847), Online publication date: 1-Jan-2022.
- Pham D, Marion D, Mastio M and Heuser A Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification Annual Computer Security Applications Conference, (706-719)
- Jayasinghe D, Ignjatovic A, Ragel R, Ambrose J and Parameswaran S (2021). QuadSeal: Quadruple Balancing to Mitigate Power Analysis Attacks with Variability Effects and Electromagnetic Fault Injection Attacks, ACM Transactions on Design Automation of Electronic Systems, 26:5, (1-36), Online publication date: 30-Sep-2021.
- Kandar S, Pal S and Dhara B (2021). A Biometric based Remote User Authentication Technique Using Smart Card in Multi-Server Environment, Wireless Personal Communications: An International Journal, 120:2, (1003-1026), Online publication date: 1-Sep-2021.
- Rioja U, Paguada S, Batina L and Armendariz I (2021). The Uncertainty of Side-channel Analysis: A Way to Leverage from Heuristics, ACM Journal on Emerging Technologies in Computing Systems, 17:3, (1-27), Online publication date: 31-Jul-2021.
- Picek S and Jakobovic D Evolutionary computation and machine learning in cryptology Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1089-1118)
- Wang R, Wang H, Dubrova E and Brisfors M Advanced Far Field EM Side-Channel Attack on AES Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, (29-39)
- Keren O and Polian I On resilience of security-oriented error detecting architectures against power attacks Proceedings of the 18th ACM International Conference on Computing Frontiers, (229-237)
- Gao P, Xie H, Song F and Chen T (2021). A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs, ACM Transactions on Software Engineering and Methodology, 30:3, (1-42), Online publication date: 1-May-2021.
- Yuan Y, Zhang Y, Zhao Y, Zhang X, Tang M and Valenza F (2021). Process Variation-Resistant Golden-Free Hardware Trojan Detection through a Power Side Channel, Security and Communication Networks, 2021, Online publication date: 1-Jan-2021.
- Yang W, Jia A and Zhang L (2021). Side-Channel Leakage Detection with One-Way Analysis of Variance, Security and Communication Networks, 2021, Online publication date: 1-Jan-2021.
- Xu Y and Wang Q Searching for Balanced S-Boxes with High Nonlinearity, Low Differential Uniformity, and Improved DPA-Resistance Information Security, (95-106)
- Baksi A, Kumar V, Karmakar B, Bhasin S, Saha D and Chattopadhyay A A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis Information Security and Privacy, (525-542)
- Wang R, Wang H and Dubrova E Far Field EM Side-Channel Attack on AES Using Deep Learning Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security, (35-44)
- Shiozaki M, Sugawara T and Fujino T Exploring Effect of Residual Electric Charges on Cryptographic Circuits Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security, (57-66)
- Li H, Krček M and Perin G A Comparison of Weight Initializers in Deep Learning-Based Side-Channel Analysis Applied Cryptography and Network Security Workshops, (126-143)
- Paguada S, Rioja U and Armendariz I Controlling the Deep Learning-Based Side-Channel Analysis: A Way to Leverage from Heuristics Applied Cryptography and Network Security Workshops, (106-125)
- Jap D, Yli-Mäyry V, Ito A, Ueno R, Bhasin S and Homma N Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm Applied Cryptography and Network Security Workshops, (93-105)
- Labafniya M, Etemadi Borujeni S and Mentens N Evolvable Hardware Architectures on FPGA for Side-Channel Security Applied Cryptography and Network Security Workshops, (163-180)
- Masure L, Belleville N, Cagli E, Cornélie M, Couroussé D, Dumas C and Maingault L Deep Learning Side-Channel Analysis on Large-Scale Traces Computer Security – ESORICS 2020, (440-460)
- Carlet C, Djurasevic M, Jakobovic D and Picek S A Search for Additional Structure: The Case of Cryptographic S-boxes Parallel Problem Solving from Nature – PPSN XVI, (343-356)
- Bellizia D, Bronchain O, Cassiers G, Grosso V, Guo C, Momin C, Pereira O, Peters T and Standaert F Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography Advances in Cryptology – CRYPTO 2020, (369-400)
- Moghimi D, Sunar B, Eisenbarth T and Heninger N TPM-Fail Proceedings of the 29th USENIX Conference on Security Symposium, (2057-2073)
- Agosta G, Barenghi A and Pelosi G (2020). Compiler-Based Techniques to Secure Cryptographic Embedded Software Against Side-Channel Attacks, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39:8, (1550-1554), Online publication date: 1-Aug-2020.
- Feng H, Zhou J, Lin W, Zhang Y and Qu Z (2020). Multiple-Input, Multilayer-Perception-Based Classification of Traces From Side-Channel Attacks, Computer, 53:8, (40-48), Online publication date: 1-Aug-2020.
- Hettwer B, Fennes D, Leger S, Richter-Brockmann J, Gehrer S and Güneysu T Deep learning multi-channel fusion attack against side-channel protected hardware Proceedings of the 57th ACM/EDAC/IEEE Design Automation Conference, (1-6)
- Rioja U, Batina L and Armendariz I When Similarities Among Devices are Taken for Granted: Another Look at Portability Progress in Cryptology - AFRICACRYPT 2020, (337-357)
- Picek S and Jakobovic D Evolutionary computation and machine learning in cryptology Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion, (1147-1173)
- Shao Z, Islam M and Ren S (2020). Your Noise, My Signal, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 4:1, (1-39), Online publication date: 27-May-2020.
- Durvaux F and Durvaux M (2020). SCA-Pitaya, Digital Threats: Research and Practice, 1:1, (1-16), Online publication date: 31-Mar-2020.
- Mo J, Hu Z, Lin Y and Thamilarasu G (2020). Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks, Security and Communication Networks, 2020, Online publication date: 1-Jan-2020.
- Aghaie A and Moradi A (2020). TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions, IEEE Transactions on Information Forensics and Security, 15, (3470-3481), Online publication date: 1-Jan-2020.
- Zhang F, Dong X, Yang B, Zhou Y and Ren K (2019). A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures, IEEE Transactions on Information Forensics and Security, 15, (1407-1422), Online publication date: 1-Jan-2020.
- Zhang H (2019). On the Exact Relationship Between the Success Rate of Template Attack and Different Parameters, IEEE Transactions on Information Forensics and Security, 15, (681-694), Online publication date: 1-Jan-2020.
- Utyamishev D and Partin-Vaisband I (2019). Real-Time Detection of Power Analysis Attacks by Machine Learning of Power Supply Variations On-Chip, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39:1, (45-55), Online publication date: 1-Jan-2020.
- Li Y, Tang M, Wang P, Li Y and Fu S Practical Evaluation Methodology of Higher-Order Maskings at Different Operating Frequencies Information and Communications Security, (287-304)
- Arribas V, Nikova S and Rijmen V (2022). Guards in action, Microprocessors & Microsystems, 71:C, Online publication date: 1-Nov-2019.
- Agrawal R, Vemuri R and Borowczak M (2019). A State Machine Encoding Methodology Against Power Analysis Attacks, Journal of Electronic Testing: Theory and Applications, 35:5, (621-639), Online publication date: 1-Oct-2019.
- Wang Q (2019). Hadamard matrices, d-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weights, Designs, Codes and Cryptography, 87:10, (2321-2333), Online publication date: 1-Oct-2019.
- Eger M and Gruss D Wait a second Proceedings of the 14th International Conference on the Foundations of Digital Games, (1-7)
- Caleiro C, Casal F and Mordido A (2019). Generalized probabilistic satisfiability and applications to modelling attackers with side-channel capabilities, Theoretical Computer Science, 781:C, (39-62), Online publication date: 16-Aug-2019.
- Batina L, Bhasin S, Jap D and Picek S CSI NN Proceedings of the 28th USENIX Conference on Security Symposium, (515-532)
- Amadori A, Michiels W and Roelse P A DFA Attack on White-Box Implementations of AES with External Encodings Selected Areas in Cryptography – SAC 2019, (591-617)
- Sugawara T, Shoji N, Sakiyama K, Matsuda K, Miura N and Nagata M (2019). Side-channel leakage from sensor-based countermeasures against fault injection attack, Microelectronics Journal, 90:C, (63-71), Online publication date: 1-Aug-2019.
- Husa J Designing correlation immune boolean functions with minimal hamming weight using various genetic programming methods Proceedings of the Genetic and Evolutionary Computation Conference Companion, (342-343)
- Zhou L, Su C, Hu Z, Lee S and Seo H (2019). Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device, ACM Transactions on Embedded Computing Systems, 18:3, (1-13), Online publication date: 13-Jun-2019.
- Batina L, Jauernig P, Mentens N, Sadeghi A and Stapf E In Hardware We Trust Proceedings of the 56th Annual Design Automation Conference 2019, (1-4)
- Jayasinghe D, Ignjatovic A and Parameswaran S RFTC Proceedings of the 56th Annual Design Automation Conference 2019, (1-6)
- De P, Mandal C and Prampalli U (2019). Path-Balanced Logic Design to Realize Block Ciphers Resistant to Power and Timing Attacks, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 27:5, (1080-1092), Online publication date: 1-May-2019.
- Yan Y and Oswald E Examining the practical side channel resilience of ARX-boxes Proceedings of the 16th ACM International Conference on Computing Frontiers, (373-379)
- Pammu A, Ho W, Lwin N, Chong K and Gwee B (2018). A High Throughput and Secure Authentication-Encryption AES-CCM Algorithm on Asynchronous Multicore Processor, IEEE Transactions on Information Forensics and Security, 14:4, (1023-1036), Online publication date: 1-Apr-2019.
- Zhang S, Yang X, Chen L, Zhong W and Agosta G (2019). A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition, Security and Communication Networks, 2019, Online publication date: 1-Jan-2019.
- Mo J, Chen H and Genge B (2019). A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks, Security and Communication Networks, 2019, Online publication date: 1-Jan-2019.
- Duc A, Dziembowski S and Faust S (2019). Unifying Leakage Models, Journal of Cryptology, 32:1, (151-177), Online publication date: 1-Jan-2019.
- Belleville N, Couroussé D, Heydemann K and Charles H (2018). Automated Software Protection for the Masses Against Side-Channel Attacks, ACM Transactions on Architecture and Code Optimization, 15:4, (1-27), Online publication date: 31-Dec-2019.
- Wichelmann J, Moghimi A, Eisenbarth T and Sunar B MicroWalk Proceedings of the 34th Annual Computer Security Applications Conference, (161-173)
- Ming T, Yanbin L, Dongyan Z, Yuguang L, Fei Y and Huanguo Z (2018). Leak Point Locating in Hardware Implementations of Higher-Order Masking Schemes, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37:12, (3008-3019), Online publication date: 1-Dec-2018.
- Delledonne L, Zaccaria V, Susella R, Bertoni G and Melzani F (2018). CASCA, ACM Transactions on Design Automation of Electronic Systems, 23:6, (1-17), Online publication date: 30-Nov-2018.
- Wang C, Cai Y, Wang H and Zhou Q Electromagnetic Equalizer: An Active Countermeasure Against EM Side-channel Attack 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), (1-8)
- Guo S, Wu M and Wang C Adversarial symbolic execution for detecting concurrency-related cache timing leaks Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (377-388)
- Kamel D, Bellizia D, Standaert F, Flandre D and Bol D Demonstrating an LPPN Processor Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, (18-23)
- Zoni D, Barenghi A, Pelosi G and Fornaciari W (2018). A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture, ACM Transactions on Design Automation of Electronic Systems, 23:5, (1-30), Online publication date: 30-Sep-2018.
- Hettwer B, Gehrer S and Güneysu T Profiled Power Analysis Attacks Using Convolutional Neural Networks with Domain Knowledge Selected Areas in Cryptography – SAC 2018, (479-498)
- Lanet J, Bouder H, Benattou M and Legay A (2018). When time meets test, International Journal of Information Security, 17:4, (395-409), Online publication date: 1-Aug-2018.
- Wu M, Guo S, Schaumont P and Wang C Eliminating timing side-channel leaks using program repair Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, (15-26)
- Park J, Xu X, Jin Y, Forte D and Tehranipoor M Power-based side-channel instruction-level disassembler Proceedings of the 55th Annual Design Automation Conference, (1-6)
- Park J, Xu X, Jin Y, Forte D and Tehranipoor M Power-based Side-Channel Instruction-level Disassembler 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC), (1-6)
- Althoff A, McMahan J, Vega L, Davidson S, Sherwood T, Taylor M and Kastner R Hiding intermittent information leakage with architectural support for blinking Proceedings of the 45th Annual International Symposium on Computer Architecture, (638-649)
- Montasari R, Hosseinian-Far A, Hill R, Montaseri F, Sharma M and Shabbir S (2018). Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?, International Journal of Organizational and Collective Intelligence, 8:2, (32-59), Online publication date: 1-Apr-2018.
- Couroussé D, Barry T, Robisson B, Belleville N, Jaillon P, Potin O, Le Bouder H, Lanet J and Heydemann K All paths lead to Rome Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, (17-18)
- Li Y, Tang M, Li Y and Zhang H (2018). Several weaknesses of the implementation for the theoretically secure masking schemes under ISW framework, Integration, the VLSI Journal, 60:C, (92-98), Online publication date: 1-Jan-2018.
- Yan M, Gopireddy B, Shull T and Torrellas J (2017). Secure Hierarchy-Aware Cache Replacement Policy (SHARP), ACM SIGARCH Computer Architecture News, 45:2, (347-360), Online publication date: 14-Sep-2017.
- Tang M, Guo Z, Heuser A, Ren Y, Li J and Danger J (2017). PFD—A Flexible Higher-Order Masking Scheme, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 36:8, (1327-1339), Online publication date: 1-Aug-2017.
- Picek S Evolutionary computation and cryptology Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1066-1093)
- Yan M, Gopireddy B, Shull T and Torrellas J Secure Hierarchy-Aware Cache Replacement Policy (SHARP) Proceedings of the 44th Annual International Symposium on Computer Architecture, (347-360)
- Samwel N and Daemen J DPA on hardware implementations of Ascon and Keyak Proceedings of the Computing Frontiers Conference, (415-424)
- Liu Z, Weng J, Hu Z and Seo H (2016). Efficient Elliptic Curve Cryptography for Embedded Devices, ACM Transactions on Embedded Computing Systems, 16:2, (1-18), Online publication date: 14-Apr-2017.
- Unterluggauer T, Werner M and Mangard S Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, (690-702)
- Genkin D, Shamir A and Tromer E (2017). Acoustic Cryptanalysis, Journal of Cryptology, 30:2, (392-443), Online publication date: 1-Apr-2017.
- Homma N, Hayashi Y, Miura N, Fujimoto D, Nagata M and Aoki T (2017). Design Methodology and Validity Verification for a Reactive Countermeasure Against EM Attacks, Journal of Cryptology, 30:2, (373-391), Online publication date: 1-Apr-2017.
- Moos T, Moradi A and Richter B Static power side-channel analysis of a threshold implementation prototype chip Proceedings of the Conference on Design, Automation & Test in Europe, (1324-1329)
- Unterluggauer T, Werner M and Mangard S Side-channel plaintext-recovery attacks on leakage-resilient encryption Proceedings of the Conference on Design, Automation & Test in Europe, (1318-1323)
- Seuschek H, De Santis F and Guillen O Side-channel leakage aware instruction scheduling Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, (7-12)
- Wang A, Zhang Y, Zhu L, Tian W, Xu R, Zhang G and Du X (2017). RFA, Security and Communication Networks, 2017, Online publication date: 1-Jan-2017.
- Mazumdar B, Ali S and Sinanoglu O (2016). A Compact Implementation of Salsa20 and Its Power Analysis Vulnerabilities, ACM Transactions on Design Automation of Electronic Systems, 22:1, (1-26), Online publication date: 28-Dec-2016.
- Frieslaar I and Irwin B Investigating Multi-Thread Utilization as a Software Defence Mechanism Against Side Channel Attacks Proceedings of the 8th International Conference on Signal Processing Systems, (189-193)
- Fan G, Zhou Y, Zhang H and Feng D (2016). Towards optimal leakage exploitation rate in template attacks, Security and Communication Networks, 9:16, (3116-3126), Online publication date: 10-Nov-2016.
- Samotyja J and Lemke-Rust K Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 Processor Proceedings of the 2016 ACM Workshop on Theory of Implementation Security, (27-35)
- Genkin D, Pachmanov L, Pipman I, Tromer E and Yarom Y ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (1626-1638)
- Oren Y and Wool A (2016). Side-channel cryptographic attacks using pseudo-boolean optimization, Constraints, 21:4, (616-645), Online publication date: 1-Oct-2016.
- Dziembowski S, Faust S, Herold G, Journault A, Masny D and Standaert F Towards Sound Fresh Re-keying with Hard Physical Learning Problems Proceedings, Part II, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 9815, (272-301)
- Seo H, Liu Z, Nogami Y, Choi J and Kim H (2016). Hybrid Montgomery Reduction, ACM Transactions on Embedded Computing Systems, 15:3, (1-13), Online publication date: 21-Jul-2016.
- Picek S Evolutionary Computation and Cryptology Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion, (883-909)
- Dessouky G and Sadeghi A POSTER Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, (223-224)
- Bultel X, Gambs S, Gérault D, Lafourcade P, Onete C and Robert J A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, (121-133)
- Chen C, Eisenbarth T, von Maurich I and Steinwandt R (2016). Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem, IEEE Transactions on Information Forensics and Security, 11:6, (1093-1105), Online publication date: 1-Jun-2016.
- Bartkewitz T (2016). Leakage Prototype Learning for Profiled Differential Side-Channel Cryptanalysis, IEEE Transactions on Computers, 65:6, (1761-1774), Online publication date: 1-Jun-2016.
- Ou C, Wang Z, Ai J, Zhou X, Sun D and DeBrunner V Error Tolerance based Single Interesting Point Side Channel CPA Distinguisher Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, (819-827)
- Liu Z, Gao N, Tu C, Zhou J, Ma Y and Zhao Y Leakage Fingerprints Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, (807-818)
- Genkin D, Pachmanov L, Pipman I, Shamir A and Tromer E (2016). Physical key extraction attacks on PCs, Communications of the ACM, 59:6, (70-79), Online publication date: 23-May-2016.
- O'Neill M, O'Sullivan E, McWilliams G, Saarinen M, Moore C, Khalid A, Howe J, del Pino R, Abdalla M, Regazzoni F, Valencia F, Güneysu T, Oder T, Waller A, Jones G, Barnett A, Griffin R, Byrne A, Ammar B and Lund D Secure architectures of future emerging cryptography SAFEcrypto Proceedings of the ACM International Conference on Computing Frontiers, (315-322)
- Durvaux F and Standaert F From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces Proceedings, Part I, of the 35th Annual International Conference on Advances in Cryptology --- EUROCRYPT 2016 - Volume 9665, (240-262)
- Maghrebi H, Servant V and Bringer J There Is Wisdom in Harnessing the Strengths of Your Enemy Revised Selected Papers of the 23rd International Conference on Fast Software Encryption - Volume 9783, (223-243)
- Regazzoni F and Ienne P Instruction set extensions for secure applications Proceedings of the 2016 Conference on Design, Automation & Test in Europe, (1529-1534)
- Liu N, Chong K, Ho W, Gwee B and Chang J Low normalized energy derivation asynchronous circuit synthesis flow through fork-join slack matching for cryptographic applications Proceedings of the 2016 Conference on Design, Automation & Test in Europe, (850-853)
- Pessl P and Mangard S Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability Proceedings of the RSA Conference on Topics in Cryptology - CT-RSA 2016 - Volume 9610, (255-270)
- Genkin D, Pachmanov L, Pipman I and Tromer E ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs Proceedings of the RSA Conference on Topics in Cryptology - CT-RSA 2016 - Volume 9610, (219-235)
- Dubeuf J, Hely D and Beroulle V (2016). ECDSA Passive Attacks, Leakage Sources, and Common Design Mistakes, ACM Transactions on Design Automation of Electronic Systems, 21:2, (1-24), Online publication date: 28-Jan-2016.
- Martin D, Oswald E, Stam M and Wójcik M A Leakage Resilient MAC Proceedings of the 15th IMA International Conference on Cryptography and Coding - Volume 9496, (295-310)
- Picek S, Guilley S, Carlet C, Jakobovic D and Miller J Evolutionary Approach for Finding Correlation Immune Boolean Functions of Order t with Minimal Hamming Weight Proceedings of the Fourth International Conference on Theory and Practice of Natural Computing - Volume 9477, (71-82)
- Sasdrich P and Güneysu T (2015). Implementing Curve25519 for Side-Channel--Protected Elliptic Curve Cryptography, ACM Transactions on Reconfigurable Technology and Systems, 9:1, (1-15), Online publication date: 24-Nov-2015.
- Yan L, Guo Y, Chen X and Mei H A Study on Power Side Channels on Mobile Devices Proceedings of the 7th Asia-Pacific Symposium on Internetware, (30-38)
- Won Y, Hodgers P, O'Neill M and Han D On the Security of Balanced Encoding Countermeasures Revised Selected Papers of the 14th International Conference on Smart Card Research and Advanced Applications - Volume 9514, (242-256)
- Portella Do Canto R, Korkikian R and Naccache D Buying AES Design Resistance withźSpeedźandźEnergy LNCS Essays on The New Codebreakers - Volume 9100, (134-147)
- Dutertre J, Mirbaha A, Naccache D and Tria A Photonic Power Firewalls LNCS Essays on The New Codebreakers - Volume 9100, (342-354)
- Oren Y, Kemerlis V, Sethumadhavan S and Keromytis A The Spy in the Sandbox Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (1406-1418)
- Pereira O, Standaert F and Vivek S Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (96-108)
- Al Faruque M, Regazzoni F and Pajic M Design methodologies for securing cyber-physical systems Proceedings of the 10th International Conference on Hardware/Software Codesign and System Synthesis, (30-36)
- Jayasinghe D, Ignjatovic A, Ambrose J, Ragel R and Parameswaran S QuadSeal Proceedings of the 2015 International Conference on Compilers, Architecture and Synthesis for Embedded Systems, (21-30)
- Malagón P, de Goyeneche J, Fraga D and Moya J Bitslice software implementation of KeeLoq as a side-channel countermeasure Proceedings of the WESS'15: Workshop on Embedded Systems Security, (1-8)
- Nascimento E, López J and Dahab R Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers Proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering - Volume 9354, (289-309)
- Picek S, Mazumdar B, Mukhopadhyay D and Batina L Modified Transparency Order Property Proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering - Volume 9354, (210-227)
- Eldib H, Chao Wang , Taha M and Schaumont P (2015). Quantitative Masking Strength: Quantifying the Power Side-Channel Resistance of Software Code, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34:10, (1558-1568), Online publication date: 1-Oct-2015.
- Ahn H, Hanley N, O'Neill M and Han D An Improved Second-Order Power Analysis Attack Based on a New Refined Expecter Revised Selected Papers of the 16th International Workshop on Information Security Applications - Volume 9503, (174-186)
- Gornik A, Moradi A, Oehm J and Paar C (2015). A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design, Implementation, and Evaluation, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34:8, (1308-1319), Online publication date: 1-Aug-2015.
- Xinmu Wang , Yu Zheng , Basak A and Bhunia S (2015). IIPS: Infrastructure IP for Secure SoC Design, IEEE Transactions on Computers, 64:8, (2226-2238), Online publication date: 1-Aug-2015.
- Picek S, Carlet C, Jakobovic D, Miller J and Batina L Correlation Immunity of Boolean Functions Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (1095-1102)
- DeTrano A, Guilley S, Guo X, Karimi N and Karri R Exploiting small leakages in masks to turn a second-order attack into a first-order attack Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, (1-5)
- Miura N, Fujimoto D, Nagata M, Homma N, Hayashi Y and Aoki T EM attack sensor Proceedings of the 52nd Annual Design Automation Conference, (1-6)
- Agosta G, Barenghi A, Pelosi G and Scandale M Information leakage chaff Proceedings of the 52nd Annual Design Automation Conference, (1-6)
- Chen J, Liu M, Li H and Shi H Mind Your Nonces Moving Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, (609-614)
- Sasdrich P, Mischke O, Moradi A and Güneysu T Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 9064, (95-107)
- Wild A, Moradi A and Güneysu T Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 9064, (81-94)
- Sugawara T, Suzuki D and Saeki M Two Operands of Multipliers in Side-Channel Attack Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 9064, (64-78)
- Muehlberghuber M, Korak T, Dunst P and Hutter M Towards Evaluating DPA Countermeasures for Keccak K1012ECCAK on a Real ASIC Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 9064, (222-236)
- Vadnala P and Groβschädl J Faster Mask Conversion with Lookup Tables Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 9064, (207-221)
- Picek S, Batina L, Buzing P and Jakobovic D Fault Injection with a New Flavor Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 9064, (159-173)
- Specht R, Heyszl J, Kleinsteuber M and Sigl G Improving Non-profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-channel High-Resolution EM Measurements Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 9064, (3-19)
- Hernández J, Ferber A, Prowell S and Hively L Phase-Space Detection of Cyber Events Proceedings of the 10th Annual Cyber and Information Security Research Conference, (1-4)
- Avital M, Dagan H, Keren O and Fish A (2015). Randomized Multitopology Logic Against Differential Power Analysis, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 23:4, (702-711), Online publication date: 1-Apr-2015.
- Agosta G, Barenghi A, Pelosi G and Scandale M (2015). Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software, Information Processing Letters, 115:2, (292-297), Online publication date: 1-Feb-2015.
- Swierczynski P, Moradi A, Oswald D and Paar C (2014). Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs, ACM Transactions on Reconfigurable Technology and Systems, 7:4, (1-23), Online publication date: 23-Jan-2015.
- Carbone M, Teglia Y, Maurine P and Ducharme G Interest of MIA in frequency domain? Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, (35-38)
- Eldib H, Wang C and Schaumont P (2014). Formal Verification of Software Countermeasures against Side-Channel Attacks, ACM Transactions on Software Engineering and Methodology, 24:2, (1-24), Online publication date: 23-Dec-2014.
- Fan G, Zhou Y, Zhang H and Feng D Template Attacks Based on Priori Knowledge Revised Selected Papers of the 6th International Conference on Trusted Systems - Volume 9473, (346-363)
- Fan G, Zhou Y, Zhang H and Feng D How to Choose Interesting Points for Template Attacks More Effectively? Revised Selected Papers of the 6th International Conference on Trusted Systems - Volume 9473, (168-183)
- Guillen O, Brederlow R, Ledwa R and Sigl G Risk management in embedded devices using metering applications as example Proceedings of the 9th Workshop on Embedded Systems Security, (1-9)
- Moradi A and Immler V Early Propagation and Imbalanced Routing, How to Diminish in FPGAs Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems --- CHES 2014 - Volume 8731, (598-615)
- Oren Y, Weisse O and Wool A A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems --- CHES 2014 - Volume 8731, (17-34)
- Genkin D, Pipman I and Tromer E Get Your Hands Off My Laptop Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems --- CHES 2014 - Volume 8731, (242-260)
- Homma N, Hayashi Y, Miura N, Fujimoto D, Tanaka D, Nagata M and Aoki T EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems --- CHES 2014 - Volume 8731, (1-16)
- Loder L, de Souza A, Fay M and Soares R Towards a Framework to Perform DPA Attack on GALS Pipeline Architectures Proceedings of the 27th Symposium on Integrated Circuits and Systems Design, (1-7)
- Eldib H and Wang C Synthesis of Masking Countermeasures against Side Channel Attacks Proceedings of the 16th International Conference on Computer Aided Verification - Volume 8559, (114-130)
- Bringer J, Carlet C, Chabanne H, Guilley S and Maghrebi H Orthogonal Direct Sum Masking Proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Securing the Internet of Things - Volume 8501, (40-56)
- Eldib H, Wang C, Taha M and Schaumont P QMS Proceedings of the 51st Annual Design Automation Conference, (1-6)
- Wang D, Wang A and Zheng X Fault-Tolerant Linear Collision Attack Proceedings of the 10th International Conference on Information Security Practice and Experience - Volume 8434, (232-246)
- Picek S, Ege B, Batina L, Jakobovic D, Chmielewski Ł and Golub M On using genetic algorithms for intrinsic side-channel resistance Proceedings of the First Workshop on Cryptography and Security in Computing Systems, (13-18)
- Santis F, Kasper M, Mangard S, Sigl G, Stein O and Stöttinger M On the Relationship between Correlation Power Analysis and the Stochastic Approach Proceedings of the 14th International Conference on Progress in Cryptology — INDOCRYPT 2013 - Volume 8250, (215-226)
- Lomné V, Prouff E and Roche T Behind the Scene of Side Channel Attacks Part I of the Proceedings of the 19th International Conference on Advances in Cryptology - ASIACRYPT 2013 - Volume 8269, (506-525)
- Wang D and Wang P Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards Proceedings of the 16th International Conference on Information Security - Volume 7807, (221-237)
- Weiner M, Massar M, Tews E, Giese D and Wieser W Security analysis of a widely deployed locking system Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (929-940)
- Oswald D, Richter B and Paar C Side-Channel Attacks on the Yubikey 2 One-Time Password Generator Proceedings of the 16th International Symposium on Research in Attacks, Intrusions, and Defenses - Volume 8145, (204-222)
- Antonini A, Barenghi A and Pelosi G Security Analysis of Building Automation Networks Proceedings of the 18th Nordic Conference on Secure IT Systems - Volume 8208, (199-214)
- Pöppelmann T and Güneysu T Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware Revised Selected Papers on Selected Areas in Cryptography -- SAC 2013 - Volume 8282, (68-85)
- Oswald D, Strobel D, Schellenberg F, Kasper T and Paar C When Reverse-Engineering Meets Side-Channel Analysis --- Digital Lockpicking in Practice Revised Selected Papers on Selected Areas in Cryptography -- SAC 2013 - Volume 8282, (571-588)
- Carlet C and Guilley S Side-channel indistinguishability Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, (1-8)
- Oren Y, Weisse O and Wool A Practical template-algebraic side channel attacks with extremely low data complexity Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, (1-8)
- Cobb W, Baldwin R and Laspe E (2013). Leakage Mapping, ACM Transactions on Information and System Security, 16:1, (1-29), Online publication date: 1-Jun-2013.
- Agosta G, Barenghi A, Maggi M and Pelosi G Compiler-based side channel vulnerability analysis and optimized countermeasures application Proceedings of the 50th Annual Design Automation Conference, (1-6)
- Wang X, Yueh W, Roy D, Narasimhan S, Zheng Y, Mukhopadhyay S, Mukhopadhyay D and Bhunia S Role of power grid in side channel attack and power-grid-aware secure design Proceedings of the 50th Annual Design Automation Conference, (1-9)
- Plos T and Maierhofer C (2013). On measuring the parasitic backscatter of sensor-enabled UHF RFID tags, Information Security Tech. Report, 17:4, (239-252), Online publication date: 1-May-2013.
- Bayrak A, Velickovic N, Regazzoni F, Novo D, Brisk P and Ienne P An EDA-friendly protection scheme against side-channel attacks Proceedings of the Conference on Design, Automation and Test in Europe, (410-415)
- Li Y, Endo S, Debande N, Homma N, Aoki T, Le T, Danger J, Ohta K and Sakiyama K Exploring the relations between fault sensitivity and power consumption Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design, (137-153)
- Roche T and Lomné V Collision-Correlation attack against some 1st-order boolean masking schemes in the context of secure devices Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design, (114-136)
- Kutzner S, Nguyen P, Poschmann A and Wang H On 3-share threshold implementations for 4-bit s-boxes Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design, (99-113)
- Krämer J, Nedospasov D, Schlösser A and Seifert J Differential photonic emission analysis Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design, (1-16)
- Moradi A, Oswald D, Paar C and Swierczynski P Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II Proceedings of the ACM/SIGDA international symposium on Field programmable gate arrays, (91-100)
- Hively L and McDonald J Theorem-based, data-driven, cyber event detection Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, (1-4)
- Krieg A, Grinschgl J, Steger C, Weiss R, Bock H and Haid J (2012). POWER-MODES, ACM Transactions on Reconfigurable Technology and Systems, 5:4, (1-21), Online publication date: 1-Dec-2012.
- Bertoni G, Daemen J, Debande N, Le T, Peeters M and Van Assche G Power Analysis of Hardware Implementations Protected with Secret Sharing Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops, (9-16)
- Durvaux F, Renauld M, Standaert F, van Oldeneel tot Oldenzeel L and Veyrat-Charvillon N Efficient removal of random delays from embedded software implementations using hidden markov models Proceedings of the 11th international conference on Smart Card Research and Advanced Applications, (123-140)
- Bettale L Secure multiple SBoxes implementation with arithmetically masked input Proceedings of the 11th international conference on Smart Card Research and Advanced Applications, (91-105)
- Bartkewitz T and Lemke-Rust K Efficient template attacks based on probabilistic multi-class support vector machines Proceedings of the 11th international conference on Smart Card Research and Advanced Applications, (263-276)
- Heyszl J, Merli D, Heinz B, De Santis F and Sigl G Strengths and limitations of high-resolution electromagnetic field measurements for side-channel analysis Proceedings of the 11th international conference on Smart Card Research and Advanced Applications, (248-262)
- Oswald D and Paar C Improving side-channel analysis with optimal linear transforms Proceedings of the 11th international conference on Smart Card Research and Advanced Applications, (219-233)
- Yalçın T and Kavun E On the implementation aspects of sponge-based authenticated encryption for pervasive devices Proceedings of the 11th international conference on Smart Card Research and Advanced Applications, (141-157)
- Geng H, Wu J, Liu J, Choi M and Shi Y Utilizing random noise in cryptography Proceedings of the International Conference on Computer-Aided Design, (163-167)
- Anandakumar N and Dillibabu S Correlation power analysis attack of AES on FPGA using customized communication protocol Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, (683-688)
- Hein D, Toegl R, Pirker M, Gatial E, Balogh Z, Brandl H and Hluchý L Securing mobile agents for crisis management support Proceedings of the seventh ACM workshop on Scalable trusted computing, (85-90)
- Moradi A and Mischke O How far should theory be from practice? Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems, (92-106)
- Fei Y, Luo Q and Ding A A statistical model for DPA with novel algorithmic confusion analysis Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems, (233-250)
- Medwed M, Standaert F and Joux A Towards super-exponential side-channel security with efficient leakage-resilient PRFs Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems, (193-212)
- Pamula D and Tisserand A GF(2) finite-field multipliers with reduced activity variations Proceedings of the 4th international conference on Arithmetic of Finite Fields, (152-167)
- Mohamed N, Hashim M and Hutter M Improved fixed-base comb method for fast scalar multiplication Proceedings of the 5th international conference on Cryptology in Africa, (342-359)
- Ye X and Eisenbarth T Wide collisions in practice Proceedings of the 10th international conference on Applied Cryptography and Network Security, (329-343)
- Agosta G, Barenghi A and Pelosi G A code morphing methodology to automate power analysis countermeasures Proceedings of the 49th Annual Design Automation Conference, (77-82)
- Mansouri S and Dubrova E An architectural countermeasure against power analysis attacks for FSR-Based stream ciphers Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design, (54-68)
- Korak T, Plos T and Hutter M Attacking an AES-Enabled NFC tag Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design, (17-32)
- Zohner M, Kasper M and Stöttinger M Butterfly-Attack on skein's modular addition Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design, (215-230)
- Hutter M, Kirschbaum M, Plos T, Schmidt J and Mangard S Exploiting the difference of side-channel leakages Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design, (1-16)
- Wang A, Chen M, Wang Z and Ding Y Overcoming significant noise Proceedings of the 8th international conference on Information Security Practice and Experience, (393-404)
- Heuser A, Schindler W and Stöttinger M Revealing side-channel issues of complex circuits by enhanced leakage models Proceedings of the Conference on Design, Automation and Test in Europe, (1179-1184)
- Nassar M, Souissi Y, Guilley S and Danger J RSM Proceedings of the Conference on Design, Automation and Test in Europe, (1173-1178)
- Zohner M, Kasper M, Stöttinger M and Huss S Side channel analysis of the SHA-3 finalists Proceedings of the Conference on Design, Automation and Test in Europe, (1012-1017)
- Fan J and Verbauwhede I An updated survey on secure ECC implementations Cryptography and Security, (265-282)
- Bayrak A, Velickovic N, Ienne P and Burleson W (2012). An architecture-independent instruction shuffler to protect against side-channel attacks, ACM Transactions on Architecture and Code Optimization, 8:4, (1-19), Online publication date: 1-Jan-2012.
- Nassar M, Guilley S and Danger J Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks Proceedings of the 12th international conference on Cryptology in India, (22-39)
- Saha D, Mukhopadhyay D and RoyChowdhury D PKDPA Proceedings of the 12th international conference on Cryptology in India, (3-21)
- Strobel D and Paar C An efficient method for eliminating random delays in power traces of embedded software Proceedings of the 14th international conference on Information Security and Cryptology, (48-60)
- Yang S, Zhou Y, Liu J and Chen D Back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations Proceedings of the 14th international conference on Information Security and Cryptology, (169-185)
- Krämer J, Nedospasov D and Seifert J Weaknesses in current RSA signature schemes Proceedings of the 14th international conference on Information Security and Cryptology, (155-168)
- Li J, Zhang D, Qiu M, Zhu Y and Shen J Security protection on FPGA against differential power analysis attacks Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, (1-1)
- Hermans J, Pashalidis A, Vercauteren F and Preneel B A new RFID privacy model Proceedings of the 16th European conference on Research in computer security, (568-587)
- Veyrat-Charvillon N and Standaert F Generic side-channel distinguishers Proceedings of the 31st annual conference on Advances in cryptology, (354-372)
- Whitnall C and Oswald E A comprehensive evaluation of mutual information analysis using a fair evaluation framework Proceedings of the 31st annual conference on Advances in cryptology, (316-334)
- Hutter M, Joye M and Sierra Y Memory-constrained implementations of elliptic curve cryptography in co-Z coordinate representation Proceedings of the 4th international conference on Progress in cryptology in Africa, (170-187)
- Kasper T, Oswald D and Paar C Side-channel analysis of cryptographic RFIDs with analog demodulation Proceedings of the 7th international conference on RFID Security and Privacy, (61-77)
- Pendl C, Pelnar M and Hutter M Elliptic curve cryptography on the WISP UHF RFID tag Proceedings of the 7th international conference on RFID Security and Privacy, (32-47)
- Bayrak A, Regazzoni F, Brisk P, Standaert F and Ienne P A first step towards automatic application of power analysis countermeasures Proceedings of the 48th Design Automation Conference, (230-235)
- Maghrebi H, Guilley S and Danger J Leakage squeezing countermeasure against high-order attacks Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication, (208-223)
- Hutter M, Feldhofer M and Wolkerstorfer J A cryptographic processor for low-resource devices Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication, (144-159)
- Barenghi A, Pelosi G and Teglia Y Information leakage discovery techniques to enhance secure chip design Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication, (128-143)
- Guilley S, Khalfallah K, Lomne V and Danger J Formal framework for the evaluation of waveform resynchronization algorithms Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication, (100-115)
- Wang A, Li Z, Yang X and Yu Y A new security proof of practical cryptographic devices based on hardware, software and protocols Proceedings of the 7th international conference on Information security practice and experience, (386-400)
- Liu J, Zhou Y, Han Y, Li J, Yang S and Feng D How to characterize side-channel leakages more accurately? Proceedings of the 7th international conference on Information security practice and experience, (196-207)
- Moradi A, Poschmann A, Ling S, Paar C and Wang H Pushing the limits Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology, (69-88)
- Sharif Mansouri S and Dubrova E A countermeasure against power analysis attacks for FSR-based stream ciphers Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI, (235-240)
- Burmester M and Munilla J (2011). Lightweight RFID authentication with forward and backward security, ACM Transactions on Information and System Security, 14:1, (1-26), Online publication date: 1-May-2011.
- van Woudenberg J, Witteman M and Bakker B Improving differential power analysis by elastic alignment Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011, (104-119)
- Strenzke F Manger's attack revisited Proceedings of the 12th international conference on Information and communications security, (31-45)
- Gallais J, Großschädl J, Hanley N, Kasper M, Medwed M, Regazzoni F, Schmidt J, Tillich S and Wójcik M Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software Proceedings of the Second international conference on Trusted Systems, (253-270)
- Tillich S, Kirschbaum M and Szekely A SCA-resistant embedded processors Proceedings of the 26th Annual Computer Security Applications Conference, (211-220)
- Dyrkolbotn G, Wold K and Snekkenes E Security implications of crosstalk in switching CMOS gates Proceedings of the 13th international conference on Information security, (269-275)
- Chen Z, Sinha A and Schaumont P Implementing virtual secure circuit using a custom-instruction approach Proceedings of the 2010 international conference on Compilers, architectures and synthesis for embedded systems, (57-66)
- Sinha A, Chen Z and Schaumont P A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software Proceedings of the 5th Workshop on Embedded Systems Security, (1-9)
- Mateos E and Gebotys C A new correlation frequency analysis of the side channel Proceedings of the 5th Workshop on Embedded Systems Security, (1-8)
- Barenghi A, Pelosi G and Teglia Y Improving first order differential power attacks through digital signal processing Proceedings of the 3rd international conference on Security of information and networks, (124-133)
- Lin L, Holcomb D, Krishnappa D, Shabadi P and Burleson W Low-power sub-threshold design of secure physical unclonable functions Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design, (43-48)
- Tunstall M and Joye M Coordinate blinding over large prime fields Proceedings of the 12th international conference on Cryptographic hardware and embedded systems, (443-455)
- Oren Y, Kirschbaum M, Popp T and Wool A Algebraic side-channel analysis in the presence of errors Proceedings of the 12th international conference on Cryptographic hardware and embedded systems, (428-442)
- Järvinen K, Kolesnikov V, Sadeghi A and Schneider T Garbled circuits for leakage-resilience Proceedings of the 12th international conference on Cryptographic hardware and embedded systems, (383-397)
- Moradi A, Mischke O and Eisenbarth T Correlation-enhanced power analysis collision attack Proceedings of the 12th international conference on Cryptographic hardware and embedded systems, (125-139)
- Coron J and Kizhvatov I Analysis and improvement of the random delay countermeasure of CHES 2009 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems, (95-109)
- Fumaroli G, Martinelli A, Prouff E and Rivain M Affine masking against higher-order side channel analysis Proceedings of the 17th international conference on Selected areas in cryptography, (262-280)
- Pan J, Van Woudenberg J, Den Hartog J and Witteman M Improving DPA by peak distribution analysis Proceedings of the 17th international conference on Selected areas in cryptography, (241-261)
- Schmidt J, Tunstall M, Avanzi R, Kizhvatov I, Kasper T and Oswald D Combined implementation attack resistant exponentiation Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America, (305-322)
- Armknecht F, Sadeghi A, Visconti I and Wachsmann C On RFID privacy with mutual authentication and tag corruption Proceedings of the 8th international conference on Applied cryptography and network security, (493-510)
- Lu J, Pan J and den Hartog J Principles on the security of AES against first and second-order differential power analysis Proceedings of the 8th international conference on Applied cryptography and network security, (168-185)
- Strenzke F A timing attack against the secret permutation in the mceliece PKC Proceedings of the Third international conference on Post-Quantum Cryptography, (95-107)
- Heyse S Low-reiter Proceedings of the Third international conference on Post-Quantum Cryptography, (165-181)
- Alioto M, Poli M and Rocchi S (2010). A general power model of differential power analysis attacks to static logic circuits, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 18:5, (711-724), Online publication date: 1-May-2010.
- Schmidt J, Plos T, Kirschbaum M, Hutter M, Medwed M and Herbst C Side-Channel leakage across borders Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application, (36-48)
- Luo Q Enhance multi-bit spectral analysis on hiding in temporal dimension Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application, (13-23)
- Li Y, Sakiyama K, Batina L, Nakatsu D and Ohta K Power variance analysis breaks a masked ASIC implementation of AES Proceedings of the Conference on Design, Automation and Test in Europe, (1059-1064)
- Meynard O, Guilley S, Danger J and Sauvage L Far correlation-based EMA with a precharacterized leakage model Proceedings of the Conference on Design, Automation and Test in Europe, (977-980)
- Hutter M, Plos T and Feldhofer M (2010). On the security of RFID devices against implementation attacks, International Journal of Security and Networks, 5:2/3, (106-118), Online publication date: 1-Mar-2010.
- Moradi A and Poschmann A Lightweight cryptography and DPA countermeasures Proceedings of the 14th international conference on Financial cryptograpy and data security, (68-79)
- Armknecht F, Sadeghi A, Scafuro A, Visconti I and Wachsmann C Impossibility results for RFID privacy notions Transactions on computational science XI, (39-63)
- Kasper T, Oswald D and Paar C A versatile framework for implementation attacks on cryptographic RFIDs and embedded devices Transactions on computational science X, (100-130)
- Kasper T, Oswald D and Paar C EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment Information Security Applications, (79-93)
- Sugawara T, Hayashi Y, Homma N, Mizuki T, Aoki T, Sone H and Satoh A Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules Information Security Applications, (66-78)
- Moradi A, Mousavi N, Paar C and Salmasizadeh M A Comparative Study of Mutual Information Analysis under a Gaussian Assumption Information Security Applications, (193-205)
- Pan J, Hartog J and Lu J You Cannot Hide behind the Mask Information Security Applications, (178-192)
- Plos T, Hutter M and Feldhofer M On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices Information Security Applications, (163-177)
- Hanley N, Tunstall M and Marnane W Unknown Plaintext Template Attacks Information Security Applications, (148-162)
- Moradi A and Kasper T A new remote keyless entry system resistant to power analysis attacks Proceedings of the 7th international conference on Information, communications and signal processing, (1062-1067)
- Moradi A, Eisenbarth T, Poschmann A and Paar C Power analysis of single-rail storage elements as used in MDPL Proceedings of the 12th international conference on Information security and cryptology, (146-160)
- Kizhvatov I Side channel analysis of AVR XMEGA crypto engine Proceedings of the 4th Workshop on Embedded Systems Security, (1-7)
- Coron J and Kizhvatov I Analysis of the split mask countermeasure for embedded systems Proceedings of the 4th Workshop on Embedded Systems Security, (1-10)
- Grabher P, Großschädl J and Page D Non-deterministic processors Proceedings of the 4th Workshop on Embedded Systems Security, (1-10)
- Eisenbarth T, Güneysu T, Heyse S and Paar C MicroEliece Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, (49-64)
- Regazzoni F, Cevrero A, Standaert F, Badel S, Kluter T, Brisk P, Leblebici Y and Ienne P A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, (205-219)
- Rivain M, Prouff E and Doget J Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, (171-188)
- Popp T An introduction to implementation attacks and countermeasures Proceedings of the 7th IEEE/ACM international conference on Formal Methods and Models for Codesign, (108-115)
- Tunstall M Random Order m-ary Exponentiation Proceedings of the 14th Australasian Conference on Information Security and Privacy, (437-451)
- Joye M and Tunstall M Exponent Recoding and Regular Exponentiation Algorithms Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology, (334-349)
- Chen Z, Haider S and Schaumont P Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance, (327-336)
- Plos T Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology, (444-458)
- Popp T, Kirschbaum M and Mangard S Practical Attacks on Masked Hardware Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology, (211-225)
- Regazzoni F, Eisenbarth T, Poschmann A, Großschädl J, Gurkaynak F, Macchetti M, Toprak Z, Pozzi L, Paar C, Leblebici Y and Ienne P Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology Transactions on Computational Science IV, (230-243)
- Junod P, Karlov A and Lenstra A Improving the Boneh-Franklin Traitor Tracing Scheme Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09, (88-104)
- McEvoy R, Murphy C, Marnane W and Tunstall M (2009). Isolated WDDL, ACM Transactions on Reconfigurable Technology and Systems, 2:1, (1-23), Online publication date: 1-Mar-2009.
- Khatir M, Moradi A, Ejlali A, Manzuri Shalmani M and Salmasizadeh M A secure and low-energy logic style using charge recovery approach Proceedings of the 2008 international symposium on Low Power Electronics & Design, (259-264)
- Bogdanov A Multiple-Differential Side-Channel Collision Attacks on AES Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems, (30-44)
- Tillich S and Herbst C Attacking State-of-the-Art Software Countermeasures--A Case Study for AES Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems, (228-243)
- Plos T Susceptibility of UHF RFID tags to electromagnetic analysis Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology, (288-300)
- Kulikowski K, Venkataraman V, Wang Z and Taubin A Power balanced gates insensitive to routing capacitance mismatch Proceedings of the conference on Design, automation and test in Europe, (1280-1285)
- Bernstein D and Lange T Faster addition and doubling on elliptic curves Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security, (29-50)
- Popp T, Mangard S and Oswald E (2007). Power Analysis Attacks and Countermeasures, IEEE Design & Test, 24:6, (535-543), Online publication date: 1-Nov-2007.
- Schaumont P and Tiri K Masking and Dual-Rail Logic Don't Add Up Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, (95-106)
- Popp T, Kirschbaum M, Zefferer T and Mangard S Evaluation of the Masked Logic Style MDPL on a Prototype Chip Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, (81-94)
- Tillich S and Großschädl J Power Analysis Resistant AES Implementation with Instruction Set Extensions Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, (303-319)
- McEvoy R, Tunstall M, Murphy C and Marnane W Differential power analysis of HMAC based on SHA-2, and countermeasures Proceedings of the 8th international conference on Information security applications, (317-332)
- Leadbitter P, Page D and Smart N (2007). Nondeterministic Multithreading, IEEE Transactions on Computers, 56:7, (992-998), Online publication date: 1-Jul-2007.
- Tillich S, Herbst C and Mangard S Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis Proceedings of the 5th international conference on Applied Cryptography and Network Security, (141-157)
- Verbauwhede I and Schaumont P Design methods for security and trust Proceedings of the conference on Design, automation and test in Europe, (672-677)
- Chen Y, Hajiabadi A, Poussier R, Tavva Y, Diavastos A, Bhasin S and Carlson T PARADISE: Criticality-Aware Instruction Reordering for Power Attack Resistance, ACM Transactions on Architecture and Code Optimization, 0:0
- Jiang K, Eles P, Peng Z, Chattopadhyay S and Batina L SPARTA: A scheduling policy for thwarting differential power analysis attacks 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), (667-672)
Index Terms
- Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
Please enable JavaScript to view thecomments powered by Disqus.
Recommendations
Power Analysis Attacks and Countermeasures
One of the biggest challenges of designers of cryptographic devices is to protect the devices against implementation attacks. Power analysis attacks are among the strongest of these attacks. This article provides an overview of power analysis attacks ...
Resiliency of Smart Power Meters to Common Security Attacks
AbstractThe development of Smart Grid power systems is gaining momentum in many countries leading to massive deployment of smart meters to realize the envisioned benefits. However, there are several concerns among the consumer communities and the service ...