• McEliece

  • Referenced in 264 articles [sw02076]
  • work, we address mainly two power analysis attacks on various implementations of McEliece ... first time that such side-channel attacks are practically evaluated...
  • Enumeration RankKey

  • Referenced in 1 article [sw15087]
  • Rank estimation. As far as side-channel attacks are concerned, security evaluations do not take ... exploits the output of a typical side-channel attacks, that is a set of probability ... have enhanced a brute force attack using side-channel information, in order to minimize ... analyze the full complexity of standard side-channel attacks, in terms of tradeoffs between time...
  • OpenSCA

  • Referenced in 1 article [sw21427]
  • Matlab-based open source framework for side-channel attacks. This framework aims to support conducting ... carrying out side-channel attacks in several ways. Firstly, it provides structures (Matlab classes ... conduct DPA attacks in different ways. These objects take care of managing a large ... focus of this toolbox, other side-channel attacks can be carried out using these objects...
  • SideLine

  • Referenced in 2 articles [sw42335]
  • kind of attacks. In this work, we introduce SideLine, a novel side-channel vector based ... used to perform remote power side-channel attacks and we detail several attack scenarios...
  • CSIDH

  • Referenced in 2 articles [sw32093]
  • isogenies, which prevents certain kinds of side-channel attacks. We apply several optimizations, e.g. Elligator...
  • maskVerif

  • Referenced in 2 articles [sw40780]
  • physical defaults. Power and electromagnetic based side-channel attacks are serious threats against the security...
  • MoTE-ECC

  • Referenced in 2 articles [sw09247]
  • susceptible to a wide range of malicious attacks, which has stimulated a body of research ... efforts to harden MoTE-ECC against side-channel attacks (e.g. simple power analysis) and introduce...
  • Mastik

  • Referenced in 1 article [sw35959]
  • architectural side-channel toolkit. Micro-architectural side-channel attacks exploit contention on internal components ... information between processes. While in theory such attacks are straightforward, practical implementations tend ... entry into work on micro-architectural side-channel attacks, which hinders the development...
  • DRECON

  • Referenced in 1 article [sw09088]
  • DRECON: DPA Resistant Encryption by Construction. Side-channel attacks are considered ... ciphers which are naturally resistant against side-channel attacks. The present paper proposes a scheme ... cipher with innate protection against differential power attacks (DPA). The scheme is motivated by tweakable ... cryptographic applications. Finally we demonstrate practical side-channel resistance of a DRECON implementation...
  • CRAFT

  • Referenced in 4 articles [sw41024]
  • Against DFA Attacks. Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic ... FIDES, where efficient protection against Side-Channel Analysis (SCA) attacks has been considered in their ... implementations against Differential Fault Analysis (DFA) attacks has been one of the main design criteria ... also when fault-detection facilities, side-channel protection, and their combination are integrated into...
  • ROLLO-I

  • Referenced in 1 article [sw37628]
  • second part analyzes a side-channel attack and the associated countermeasures. The first implementation uses ... same hardware. Finally, the side-channel attack allows us to recover the secret key with...
  • CAG

  • Referenced in 1 article [sw40503]
  • primitive is inherently resistant against the side-channel attack (SCA), where many currently available ciphers...
  • SKINNY

  • Referenced in 33 articles [sw17435]
  • stronger security guarantees with regards to differential/linear attacks. In particular, unlike 𝚂𝙸𝙼𝙾𝙽, we are able ... from very efficient threshold implementations for side-channel protection. Regarding performances, it outperforms all known...
  • SCATTER

  • Referenced in 1 article [sw36685]
  • algorithms. Noticeably, the vast majority of side-channel techniques requires to get the traces aligned ... challenging in the practical realization of attacks as implementations tend to include hardware or software ... this paper, we introduce the new side-channel technique scatter, whose potential is to tackle ... summary scatter is a new side-channel technique offering a valuable alternative when the trace...
  • AMASIVE

  • Referenced in 1 article [sw07680]
  • designer in implementing side-channel hardened devices. An attacker model is introduced for the analysis...
  • MANTIS

  • Referenced in 3 articles [sw21866]
  • stronger security guarantees with regards to differential/linear attacks. In particular, unlike 𝚂𝙸𝙼𝙾𝙽, we are able ... from very efficient threshold implementations for side-channel protection. Regarding performances, it outperforms all known...
  • PIPO

  • Referenced in 1 article [sw41606]
  • block and key lengths) in both side-channel protected and unprotected environments ... enables PIPO to thwart differential and linear attacks with fewer rounds. The security of PIPO...
  • FGb

  • Referenced in 247 articles [sw00286]
  • FGb/Gb libraryGb is a program (191 420 lines...
  • gmp

  • Referenced in 289 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • Magma

  • Referenced in 3363 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...