• McEliece

  • Referenced in 264 articles [sw02076]
  • first time that such side-channel attacks are practically evaluated...
  • SKINNY

  • Referenced in 33 articles [sw17435]
  • from very efficient threshold implementations for side-channel protection. Regarding performances, it outperforms all known...
  • ICEBERG

  • Referenced in 22 articles [sw13243]
  • block ciphers. Resistance against side-channel cryptanalysis was also considered as a design criteria...
  • PICARO

  • Referenced in 18 articles [sw21867]
  • block cipher allowing efficient higher-order side-channel resistance. Many papers deal with the problem...
  • Gimli

  • Referenced in 8 articles [sw40713]
  • microcontrollers, FPGAs, ASICs without side-channel protection, and ASICs with side-channel protection...
  • CacheAudit

  • Referenced in 7 articles [sw32299]
  • automatic, static analysis of cache side channels. CacheAudit takes as input a program binary ... guarantees for a comprehensive set of side-channel adversaries, namely those based on observing cache...
  • Chipwhisperer

  • Referenced in 6 articles [sw21426]
  • research. This paper introduces a complete side channel analysis toolbox, inclusive of the analog capture...
  • CRAFT

  • Referenced in 4 articles [sw41024]
  • FIDES, where efficient protection against Side-Channel Analysis (SCA) attacks has been considered in their ... also when fault-detection facilities, side-channel protection, and their combination are integrated into...
  • HACL*

  • Referenced in 5 articles [sw36852]
  • memory safety, mitigations against timing side-channels, and functional correctness with respect to a succinct...
  • SideLine

  • Referenced in 2 articles [sw42335]
  • work, we introduce SideLine, a novel side-channel vector based on delay-line components widely ... used to perform remote power side-channel attacks and we detail several attack scenarios...
  • MANTIS

  • Referenced in 3 articles [sw21866]
  • from very efficient threshold implementations for side-channel protection. Regarding performances, it outperforms all known...
  • CBEAM

  • Referenced in 3 articles [sw15633]
  • also increased security against cache side channel attacks. Our construction supports sponge-based authenticated encryption...
  • SCATTER

  • Referenced in 1 article [sw36685]
  • SCATTER: a new dimension in side-channel. Side-channel techniques have been progressing over ... algorithms. Noticeably, the vast majority of side-channel techniques requires to get the traces aligned ... this paper, we introduce the new side-channel technique scatter, whose potential is to tackle ... summary scatter is a new side-channel technique offering a valuable alternative when the trace...
  • AMASIVE

  • Referenced in 1 article [sw07680]
  • AMASIVE: an adaptable and modular autonomous side-channel vulnerability evaluation framework Over the last decades ... design strategy for the development of side-channel resistant hardware implementations. In this chapter ... framework named AMASIVE (adaptable modular autonomous side-channel vulnerability evaluator), which supports the designer ... implementing side-channel hardened devices. An attacker model is introduced for the analysis...
  • Enumeration RankKey

  • Referenced in 1 article [sw15087]
  • Rank estimation. As far as side-channel attacks are concerned, security evaluations do not take ... exploits the output of a typical side-channel attacks, that is a set of probability ... enhanced a brute force attack using side-channel information, in order to minimize the expected ... analyze the full complexity of standard side-channel attacks, in terms of tradeoffs between time...
  • Mastik

  • Referenced in 1 article [sw35959]
  • Mastik: a micro-architectural side-channel toolkit. Micro-architectural side-channel attacks exploit contention ... entry into work on micro-architectural side-channel attacks, which hinders the development...
  • OpenSCA

  • Referenced in 1 article [sw21427]
  • Matlab-based open source framework for side-channel attacks. This framework aims to support conducting ... carrying out side-channel attacks in several ways. Firstly, it provides structures (Matlab classes ... focus of this toolbox, other side-channel attacks can be carried out using these objects...
  • DRECON

  • Referenced in 1 article [sw09088]
  • DRECON: DPA Resistant Encryption by Construction. Side-channel attacks are considered ... ciphers which are naturally resistant against side-channel attacks. The present paper proposes a scheme ... cryptographic applications. Finally we demonstrate practical side-channel resistance of a DRECON implementation...
  • CSIDH

  • Referenced in 2 articles [sw32093]
  • isogenies, which prevents certain kinds of side-channel attacks. We apply several optimizations, e.g. Elligator...
  • maskVerif

  • Referenced in 2 articles [sw40780]
  • physical defaults. Power and electromagnetic based side-channel attacks are serious threats against the security...