This research is the first of its kind to investigate the utilisation of a multi-threading software-based countermeasure to mitigate Side Channel Analysis (SCA) attacks, with a particular focus on the AES-128 cryptographic algorithm. This investigation is novel, as there has not been a software-based countermeasure relying on multi-threading to our knowledge. The research has been tested on the Atmel microcontrollers, as well as a more fully featured system in the form of the popular Raspberry Pi that utilises the ARM7 processor. The main contributions of this research is the introduction of a multi-threading software based countermeasure used to mitigate SCA attacks on both an embedded device and a Raspberry Pi. These threads are comprised...
In the recent years the number of interconnected devices involved in our life is rapidly growing. Th...
In the modern world today, cryptography has become ubiquitous. It can be found easily on many applic...
Abstract—Side Channel Attacks (SCAs) have proven to be very effective in extracting information from...
This research is the first of its kind to investigate the utilisation of a multi-threading software-...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
Encryption is essential for data security in the information age today. The Advanced Encryption Sta...
Encryption is a widely used practice of data security in both transit and storage, in many applicati...
This paper presents a new proposal for hiding the cryptographic key, when the so-called side-channel...
Protecting software implementations of block ciphers from side channel attacks is a sign...
Side channel attacks provide an effective way to extract secret information from the execution of cr...
Side Channel Analysis (SCA) is a method by which an adversary can gather information about a process...
Hardware security is essential in keeping sensitive information private. Because of this, it’s imper...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
Side-channel analysis (SCA) is a prominent tool to break mathematically secure cryptographic engines...
In the recent years the number of interconnected devices involved in our life is rapidly growing. Th...
In the modern world today, cryptography has become ubiquitous. It can be found easily on many applic...
Abstract—Side Channel Attacks (SCAs) have proven to be very effective in extracting information from...
This research is the first of its kind to investigate the utilisation of a multi-threading software-...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
Encryption is essential for data security in the information age today. The Advanced Encryption Sta...
Encryption is a widely used practice of data security in both transit and storage, in many applicati...
This paper presents a new proposal for hiding the cryptographic key, when the so-called side-channel...
Protecting software implementations of block ciphers from side channel attacks is a sign...
Side channel attacks provide an effective way to extract secret information from the execution of cr...
Side Channel Analysis (SCA) is a method by which an adversary can gather information about a process...
Hardware security is essential in keeping sensitive information private. Because of this, it’s imper...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
Side-channel analysis (SCA) is a prominent tool to break mathematically secure cryptographic engines...
In the recent years the number of interconnected devices involved in our life is rapidly growing. Th...
In the modern world today, cryptography has become ubiquitous. It can be found easily on many applic...
Abstract—Side Channel Attacks (SCAs) have proven to be very effective in extracting information from...