Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperJune 2023
Dynamic Gold Code-Based Chaotic Clock for Cryptographic Designs to Counter Power Analysis Attacks
GLSVLSI '23: Proceedings of the Great Lakes Symposium on VLSI 2023Pages 439–442https://doi.org/10.1145/3583781.3590295Research on side-channel attacks has recently made a lot of progress, and one of the most potential solutions is a power analysis attack. Thus, focusing on countermeasures to improve the security level of cryptographic devices is a matter of concern. ...
- invited-talkJanuary 2023
FPGA Based Countermeasures against Side Channel Attacks on Block Ciphers
ASPDAC '23: Proceedings of the 28th Asia and South Pacific Design Automation ConferencePages 365–371https://doi.org/10.1145/3566097.3568353Field Programmable Gate Arrays (FPGAs) are increasingly ubiquitous. FPGAs enable hardware acceleration and reconfigurability. Any security breach or attack on critical computations occurring on an FPGA can lead to devastating consequences. Side-channel ...
- research-articleJune 2021
QuadSeal: Quadruple Balancing to Mitigate Power Analysis Attacks with Variability Effects and Electromagnetic Fault Injection Attacks
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 26, Issue 5Article No.: 33, Pages 1–36https://doi.org/10.1145/3443706Side channel analysis attacks employ the emanated side channel information to deduce the secret keys from cryptographic implementations by analyzing the power traces during execution or scrutinizing faulty outputs. To be effective, a countermeasure must ...
- research-articleJune 2020
Are cloud FPGAs really vulnerable to power analysis attacks?
DATE '20: Proceedings of the 23rd Conference on Design, Automation and Test in EuropePages 1007–1010Recent works have demonstrated the possibility of extracting secrets from a cryptographic core running on an FPGA by means of remote power analysis attacks. To mount these attacks, an adversary implements a voltage fluctuation sensor in the FPGA logic, ...
- research-articleJanuary 2020
A secured modular exponentiation for RSA and CRT-RSA with dual blinding to resist power analysis attacks
International Journal of Information and Computer Security (IJICS), Volume 12, Issue 2-3Pages 112–129https://doi.org/10.1504/ijics.2020.105187Blinding has been one of the most effective approaches to resist power analysis attacks on asymmetric cryptosystems like RSA. Blinding is similar to masking in symmetric cryptosystems, but masking can be implemented in various ways like Boolean, affine, ...
-
- research-articleMay 2018
Impact of Aging on Template Attacks
GLSVLSI '18: Proceedings of the 2018 Great Lakes Symposium on VLSIPages 455–458https://doi.org/10.1145/3194554.3194638Template attack is the most powerful side-channel attack from an information theoretic point of view. This attack is launched in two phases. In the first phase (training) the attacker uses a training device to estimate leakage models for targeted ...
- research-articleJanuary 2018
Securing RSA against power analysis attacks through non‐uniform exponent partitioning with randomisation
IET Information Security (ISE2), Volume 12, Issue 1Pages 25–33https://doi.org/10.1049/iet-ifs.2016.0508This study presents an approach to compute randomised modular exponentiation through non‐uniform exponent partitioning. The exponent has been first partitioned into multiple parts and then shuffled by Fisher Yates method. Thereafter, every partition ...
- posterJuly 2016
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs
WiSec '16: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile NetworksPages 223–224https://doi.org/10.1145/2939918.2942426FPGA devices are increasingly deployed in wireless and heterogeneous networks in-field due to their re-programmable nature and high performance. Modern FPGA devices can have part of their logic partially reconfigured during runtime operation, which we ...
- articleJanuary 2016
Efficient implementation of power analysis attack resistant advanced encryption standard algorithm on side-channel attack standard evaluation board
International Journal of Internet Technology and Secured Transactions (IJITST), Volume 6, Issue 3Pages 203–218https://doi.org/10.1504/IJITST.2016.080392This paper presents a practical smart card implementation of advanced encryption standard AES-128 algorithm combined with a simple yet effective masking scheme to protect it against first-order power analysis attacks in both time and frequency domain. ...
- research-articleOctober 2015
QuadSeal: quadruple algorithmic symmetrizing countermeasure against power based side-channel attacks
Power based side-channel attacks attempt to obtain the secret key from implementations of cryptographic algorithms, such as Advanced Encryption Standard (AES), by analyzing the power traces during execution. Such attacks employ statistical methods to ...
- research-articleMay 2013
Compiler-based side channel vulnerability analysis and optimized countermeasures application
DAC '13: Proceedings of the 50th Annual Design Automation ConferenceArticle No.: 81, Pages 1–6https://doi.org/10.1145/2463209.2488833Modern embedded systems manage sensitive data increasingly often through cryptographic primitives. In this context, side-channel attacks, such as power analysis, represent a concrete threat, regardless of the mathematical strength of a cipher. ...
- ArticleNovember 2012
The schedulability of AES as a countermeasure against side channel attacks
SPACE'12: Proceedings of the Second international conference on Security, Privacy, and Applied Cryptography EngineeringPages 16–31https://doi.org/10.1007/978-3-642-34416-9_2Side Channel Attacks are a major concern in modern security. Two main countermeasure techniques have been studied in order to counteract them: hiding and masking. Hiding techniques try to randomize the obtained traces by adding noise or by swapping ...
- research-articleSeptember 2012
Power Analysis Attack Resistance Engineering by Dynamic Voltage and Frequency Scaling
ACM Transactions on Embedded Computing Systems (TECS), Volume 11, Issue 3Article No.: 62, Pages 1–16https://doi.org/10.1145/2345770.2345774This article proposes a novel approach to cryptosystem design to prevent power analysis attacks. Such attacks infer program behavior by continuously monitoring the power supply current going into the processor core. They form an important class of ...
- research-articleJune 2012
A code morphing methodology to automate power analysis countermeasures
DAC '12: Proceedings of the 49th Annual Design Automation ConferencePages 77–82https://doi.org/10.1145/2228360.2228376We introduce a general framework to automate the application of countermeasures against Differential Power Attacks aimed at software implementations of cryptographic primitives. The approach enables the generation of multiple versions of the code, to ...
- research-articleJune 2011
A first step towards automatic application of power analysis countermeasures
DAC '11: Proceedings of the 48th Design Automation ConferencePages 230–235https://doi.org/10.1145/2024724.2024778In cryptography, side channel attacks, such as power analysis, attempt to uncover secret information from the physical implementation of cryptosystems rather than exploiting weaknesses in the cryptographic algorithms themselves. The design and ...
- research-articleMay 2011
Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper)
SESS '11: Proceedings of the 7th International Workshop on Software Engineering for Secure SystemsPages 50–56https://doi.org/10.1145/1988630.1988640Recently, there has been extensive research on mobile devices and stream cipher to increase security. The Rabbit stream cipher was selected for the final eSTREAM portfolio organized by EU ECRYPT and as one of algorithms of the ISO/IEC 18033-4 Stream ...
- research-articleNovember 2007
Power Analysis Attacks and Countermeasures
One of the biggest challenges of designers of cryptographic devices is to protect the devices against implementation attacks. Power analysis attacks are among the strongest of these attacks. This article provides an overview of power analysis attacks ...
- ArticleSeptember 2004
Current Flattening in Software and Hardware for Security Applications
CODES+ISSS '04: Proceedings of the international conference on Hardware/Software Codesign and System Synthesis: 2004Pages 218–223This paper presents a new current flattening technique applicable in software and hardware. This technique is important in embedded cryptosystems since power analysis attacks (that make use of the current variation dependency on data and program) ...
- ArticleSeptember 2004
Current flattening in software and hardware for security applications
CODES+ISSS '04: Proceedings of the 2nd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 218–223https://doi.org/10.1145/1016720.1016773This paper presents a new current flattening technique applicable in software and hardware. This technique is important in embedded cryptosystems since power analysis attacks (that make use of the current variation dependency on data and program) ...
- ArticleMay 2003
A random M-ary method based countermeasure against side channel attacks
ICCSA'03: Proceedings of the 2003 international conference on Computational science and its applications: PartIIPages 338–347The randomization of scalar multiplication in ECC is one of the fundamental concepts in defense methods against side channel attacks. This paper proposes a countermeasure against simple and differential power analyses attacks through randomizing the ...