The expansion of the Internet of Things (IoT) raises the concern of security measures on resource-constrained devices susceptible to side-channel attacks (SCA). In 2016, The National Institute for Standard and Technology (NIST) initiated a process to solicit, evaluate, and standardize lightweight cryptographic algorithms suitable for use in resource-constrained devices, where the performance of current NIST cryptographic standards is not acceptable. This work investigates side-channel vulnerabilities of masked and unmasked versions of Schwaemm and GIFT, two of the ten lightweight cryptographic algorithms selected by NIST as finalists. To test the resilience of Schwaemm and GIFT against side-channel attacks, we apply Correlation Power Analys...
Presented on October 18, 2019 at 12:00 p.m in the Krone Engineered Biosystems Building, room 1005.Ar...
A side-channel attack (SCA) recovers secret data from a device by exploiting unintended physical lea...
International audienceDuring the last decade, Deep Neural Networks (DNN) have progressively been int...
The expansion of the Internet of Things (IoT) raises the concern of security measures on resource-co...
Computing devices continue to be increasingly spread out within our everyday environments. Computers...
In recent years, the increase of devices that are interconnected has led to a growing need for light...
Computing devices continue to be increasingly spread out within our everyday environments. Computers...
Determination of an adequate level of security and providing subsequent mechanisms to achieve it, is...
Side-Channel Attacks (SCA) attempt to recover the secret cryptographic key from an electronic device...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Many Internet of Things applications in smart cities use elliptic-curve cryptosystems due to their e...
When encryption algorithms are implemented at the physical level, information tends to leak through ...
As more and more modern systems and products use built-in microcontrollers, hardware security become...
Deep Learning (DL)-based side-channel analysis (SCA), as a new branch of SCA attacks, poses a signif...
Side-Channel Attack (SCA) is an emerging technique to reveal the secret key of crypto-devices by ana...
Presented on October 18, 2019 at 12:00 p.m in the Krone Engineered Biosystems Building, room 1005.Ar...
A side-channel attack (SCA) recovers secret data from a device by exploiting unintended physical lea...
International audienceDuring the last decade, Deep Neural Networks (DNN) have progressively been int...
The expansion of the Internet of Things (IoT) raises the concern of security measures on resource-co...
Computing devices continue to be increasingly spread out within our everyday environments. Computers...
In recent years, the increase of devices that are interconnected has led to a growing need for light...
Computing devices continue to be increasingly spread out within our everyday environments. Computers...
Determination of an adequate level of security and providing subsequent mechanisms to achieve it, is...
Side-Channel Attacks (SCA) attempt to recover the secret cryptographic key from an electronic device...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Many Internet of Things applications in smart cities use elliptic-curve cryptosystems due to their e...
When encryption algorithms are implemented at the physical level, information tends to leak through ...
As more and more modern systems and products use built-in microcontrollers, hardware security become...
Deep Learning (DL)-based side-channel analysis (SCA), as a new branch of SCA attacks, poses a signif...
Side-Channel Attack (SCA) is an emerging technique to reveal the secret key of crypto-devices by ana...
Presented on October 18, 2019 at 12:00 p.m in the Krone Engineered Biosystems Building, room 1005.Ar...
A side-channel attack (SCA) recovers secret data from a device by exploiting unintended physical lea...
International audienceDuring the last decade, Deep Neural Networks (DNN) have progressively been int...