Memory encryption is used in many devices to protect memory content from attackers with physical access to a device. However, many current memory encryption schemes can be broken using Differential Power Analysis (DPA). In this work, we present MEAS---the first Memory Encryption and Authentication Scheme providing security against DPA attacks. The scheme combines ideas from fresh re-keying and authentication trees by storing encryption keys in a tree structure to thwart first-order DPA without the need for DPA-protected cryptographic primitives. Therefore, the design strictly limits the use of every key to encrypt at most two different plaintext values. MEAS prevents higher-order DPA without changes to the cipher implementation by using mas...
Bit permutations are a common choice for diffusion function in lightweight block ciphers, owing to t...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
Side-channel attacks exploit the fact that the implementations of cryptographic algorithms leak info...
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious thre...
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious thre...
Cryptographic algorithms such as the Advanced Encryption Standard (AES) are vulnerable to side chann...
The Advanced Encryption Standard (AES) is a 128-bit block cipher that is currently being widely used...
DPA attacks usually exhibit a divide-and-conquer property: the adversary needs to enumerate only a...
Memory remanence in SRAMs and DRAMs is usually exploited through cold-boot attacks and the targets ...
The transfer of information has always been an integral part of military and civilian operations, an...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
Emerging technologies such as Spin-transfer torque magnetic random-access memory (STT-MRAM) are cons...
Power analysis has shown to be successful in breaking symmetric cryptographic algorithms implemented...
Providing efficient protection against energy consumption based side channel attacks (SCAs) for bloc...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Bit permutations are a common choice for diffusion function in lightweight block ciphers, owing to t...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
Side-channel attacks exploit the fact that the implementations of cryptographic algorithms leak info...
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious thre...
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious thre...
Cryptographic algorithms such as the Advanced Encryption Standard (AES) are vulnerable to side chann...
The Advanced Encryption Standard (AES) is a 128-bit block cipher that is currently being widely used...
DPA attacks usually exhibit a divide-and-conquer property: the adversary needs to enumerate only a...
Memory remanence in SRAMs and DRAMs is usually exploited through cold-boot attacks and the targets ...
The transfer of information has always been an integral part of military and civilian operations, an...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
Emerging technologies such as Spin-transfer torque magnetic random-access memory (STT-MRAM) are cons...
Power analysis has shown to be successful in breaking symmetric cryptographic algorithms implemented...
Providing efficient protection against energy consumption based side channel attacks (SCAs) for bloc...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Bit permutations are a common choice for diffusion function in lightweight block ciphers, owing to t...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
Side-channel attacks exploit the fact that the implementations of cryptographic algorithms leak info...