Side-channel attacks are a real threat to many secure systems. In this paper, we consider two ciphers used in the automotive industry - AES and ChaCha20 and we evaluate their resistance against side-channel attacks. In particular, the focus is laid upon the main non-linear component in these ciphers. Owing to the design of ChaCha20, it offers natural timing side-channel resistance and thus is suitable for affected applications. However, attacks exploiting the power side-channel are somewhat more difficult on ChaCha20 as compared to AES, but the overhead to protect ChaCha20 against such attack is considerably higher.Accepted versio
In this paper we present improvements of the algebraic side-channel analysis of the Advanced Encrypt...
Encryption is essential for data security in the information age today. The Advanced Encryption Sta...
Cryptography algorithms, such as Advanced Encryption Standard (AES) algorithm, are responsible for k...
Side-channel attacks are a real threat to many secure systems. In this paper, we consider two cipher...
ChaCha is a family of stream ciphers that are very efficient on constrainted platforms. In this pape...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
Side-channel analyses constitute a major threat for embedded devices, because they allow an attacker...
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, ...
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique a...
We analyze the side-channel countermeasures implemented in a high-throughput AES peripheral of a com...
The security of cryptographic implementations running on embedded systems is threatened by side-chan...
Abstract—Algebraic side-channel attack (ASCA) is a typical technique that relies on a general solver...
Abstract. We describe two new techniques of side-channel cryptanal-ysis which we call the impossible...
In this paper we present improvements of the algebraic side-channel analysis of the Advanced Encrypt...
Encryption is essential for data security in the information age today. The Advanced Encryption Sta...
Cryptography algorithms, such as Advanced Encryption Standard (AES) algorithm, are responsible for k...
Side-channel attacks are a real threat to many secure systems. In this paper, we consider two cipher...
ChaCha is a family of stream ciphers that are very efficient on constrainted platforms. In this pape...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
Side-channel analyses constitute a major threat for embedded devices, because they allow an attacker...
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, ...
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique a...
We analyze the side-channel countermeasures implemented in a high-throughput AES peripheral of a com...
The security of cryptographic implementations running on embedded systems is threatened by side-chan...
Abstract—Algebraic side-channel attack (ASCA) is a typical technique that relies on a general solver...
Abstract. We describe two new techniques of side-channel cryptanal-ysis which we call the impossible...
In this paper we present improvements of the algebraic side-channel analysis of the Advanced Encrypt...
Encryption is essential for data security in the information age today. The Advanced Encryption Sta...
Cryptography algorithms, such as Advanced Encryption Standard (AES) algorithm, are responsible for k...