Side-channel attacks are one of the greatest practical threats to security-related applications, because they are capable of breaking ciphers that are assumed to be mathematically secure. Lots of studies have been devoted to power or electro-magnetic (EM) analysis against desktop CPUs, mobile CPUs (including ARM, MSP, AVR, etc) and FPGAs, but rarely targeted modern GPUs. Modern GPUs feature their special and specific single instruction multiple threads (SIMT) execution fashion, which makes their power/EM leakage more sophisticated in practical scenarios. In this paper, we study side-channel attacks with leakage from SIMT systems, and propose leakage models suited to any SIMT systems and specifically to CUDA-enabled GPUs. Afterwards, we inst...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
Graphics Processing Units (GPUs) were introduced as peripheral devices for accelerating graphics and...
Modern computing platforms are becoming increasingly heterogeneous, combining a main processor with ...
International audienceThis chapter presents the main Side-Channel Attacks, a kind of hardware crypta...
In this paper we present GPU based implementations of popular encryption schemes Blowfish and the Ad...
Graphics Processing Units (GPUs) are becoming more and more prevalent in general-purpose computing. ...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
With the Internet-of-Things revolution, the security assessment against implementation attacks has ...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
In this survey we introduce a few secure hardware implementation methods for FPGA platforms in the c...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
Graphics Processing Units (GPUs) were introduced as peripheral devices for accelerating graphics and...
Modern computing platforms are becoming increasingly heterogeneous, combining a main processor with ...
International audienceThis chapter presents the main Side-Channel Attacks, a kind of hardware crypta...
In this paper we present GPU based implementations of popular encryption schemes Blowfish and the Ad...
Graphics Processing Units (GPUs) are becoming more and more prevalent in general-purpose computing. ...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
With the Internet-of-Things revolution, the security assessment against implementation attacks has ...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
In this survey we introduce a few secure hardware implementation methods for FPGA platforms in the c...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...