Linked e-resources
Details
Table of Contents
Physical Attacks
Times a Thief of Memory: Breaking Multi-tenant Isolation in TrustZones through Timing based Bidirectional Covert Channels
Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing
A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters
Physical Countermeasures
A Nearly Tight Proof of Duc et al.s Conjectured Security Bound for Masked Implementations
Short-Iteration Constant-Time GCD and Modular Inversion
Protecting AES
Guarding the First Order: The Rise of AES Maskings
Rivain-Prouff on Steroids: Faster and Stronger Masking of the AES
Self-Timed Masking: Implementing Masked S-Boxes Without Registers
Evaluation Methodologies
An Evaluation Procedure for Comparing Clock Jitter Measurement Methods
Comparing Key Rank Estimation Methods
Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling
Attacking NTRU
Reveal the Invisible Secret: Chosen-Ciphertext Side-Channel Attacks on NTRU
Security Assessment of NTRU Against Non-Profiled SCA
Next-Generation Cryptography
Post-Quantum Protocols for Banking Applications
Analyzing the Leakage Resistance of the NISTs Lightweight Crypto Competitions Finalists.
Times a Thief of Memory: Breaking Multi-tenant Isolation in TrustZones through Timing based Bidirectional Covert Channels
Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing
A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters
Physical Countermeasures
A Nearly Tight Proof of Duc et al.s Conjectured Security Bound for Masked Implementations
Short-Iteration Constant-Time GCD and Modular Inversion
Protecting AES
Guarding the First Order: The Rise of AES Maskings
Rivain-Prouff on Steroids: Faster and Stronger Masking of the AES
Self-Timed Masking: Implementing Masked S-Boxes Without Registers
Evaluation Methodologies
An Evaluation Procedure for Comparing Clock Jitter Measurement Methods
Comparing Key Rank Estimation Methods
Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling
Attacking NTRU
Reveal the Invisible Secret: Chosen-Ciphertext Side-Channel Attacks on NTRU
Security Assessment of NTRU Against Non-Profiled SCA
Next-Generation Cryptography
Post-Quantum Protocols for Banking Applications
Analyzing the Leakage Resistance of the NISTs Lightweight Crypto Competitions Finalists.