Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Intro
Preface
Organization
Contents
Fault and Side Channel Attacks
Persistent Fault Analysis with Few Encryptions
1 Introduction
1.1 Zhang et al.'s Attack
1.2 Contributions
1.3 Outline
2 Bias Cancelling Effect of MixColumns
3 Improvement Using Maximum Likelihood
3.1 Optimal Distinguisher
3.2 Key Byte Ranking
3.3 Combination of Several Key Bytes to Reconstruct the Full Key
3.4 Efficiencies of Key Byte Rank and Combination Algorithms
3.5 Comparison with the Tool of Veyrat-Charvillon et al. ch1DBLP:confspseurocryptspsVeyratspsCharvillonGS13

4 Conclusion and Perspectives
4.1 Conclusion
4.2 Perspectives
4.3 Note Added After Revision of the Accepted Paper
References
A Template Attack to Reconstruct the Input of SHA-3 on an 8-Bit Device
1 Introduction
2 Preliminaries and Notation
2.1 Keccak-f[1600] and SHA-3
2.2 Template Attack
2.3 Combining Multiple Likelihood Tables
3 Attack Strategy
4 Template Attack on SHA-3
4.1 Target Hardware Device and Measurement Setup
4.2 Interesting Clock Cycle Detection
4.3 Building Templates
4.4 Evaluating the Quality of Templates

5 Searching the Correct Intermediate States
5.1 Layer 1: Generating Tables for Byte Rows
5.2 Layer 2: Generating Tables for Byte Slices
5.3 Layer 3: Consistency Checking
5.4 Results
6 Discussion and Conclusion
References
Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes
1 Introduction
2 Preliminaries and Related Works
2.1 Basic Notation
2.2 Authenticated Encryptions Based on Polynomial Hash Function
2.3 The Problem of Unforgeability
2.4 Conventional SCAs on Polynomial Hash Function
3 Proposed Attack on ChaCha20-Poly1305

3.1 Attack Description
3.2 Side-Channel Analysis on Final Addition
3.3 Exhaustive Polynomial Factorization
3.4 Feasibility Evaluation
3.5 Application to Open-Source Poly1305 Implementation
4 Discussion
4.1 Noise Tolerance
4.2 Applicability and Generality of the Proposed Attack
4.3 Countermeasures
5 Conclusion
References
Side-Channel Analysis Methodologies
Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis
1 Introduction
2 Problem Statement
3 Time-Frequency Analysis with the Wavelet Scattering Transform

3.1 Some Time-Frequency Representations
3.2 The Wavelet Scattering Transform
4 A Combination Procedure for Ensemble Methods in SCA
5 Experiments
5.1 Method Used
5.2 Datasets
5.3 Choosing the Parameters
5.4 Results
5.5 Visualizing Leakages
6 Conclusion
References
Scatter: a Missing Case?
1 Introduction
2 Background
2.1 Scatter Transform with Chi2/MIA Distinguishers
2.2 On-the-Fly Linear Regression
2.3 Selection of Parameters
3 First-Order Experiments
3.1 Setting #1: A Simulated Shuffled Implementation

Browse Subjects

Show more subjects...

Statistics

from
to
Export