Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Balazs Udvarhelyi"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 3 (2023)
32-bit software implementations become increasingly popular for embedded security applications. As a result, profiling 32-bit target intermediate values becomes increasingly needed to evaluate their side-channel security. This implies the need of sta
Externí odkaz:
https://doaj.org/article/18115505f5874b2fbb391a52559c519d
Autor:
Davide Bellizia, Francesco Berti, Olivier Bronchain, Gaëtan Cassiers, Sébastien Duval, Chun Guo, Gregor Leander, Gaëtan Leurent, Itamar Levi, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert, Balazs Udvarhelyi, Friedrich Wiemer
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
This paper defines Spook: a sponge-based authenticated encryption with associated data algorithm. It is primarily designed to provide security against side-channel attacks at a low energy cost. For this purpose, Spook is mixing a leakageresistant mod
Externí odkaz:
https://doaj.org/article/6ccc6ff93c074f8180c6ef6c98574633
Publikováno v:
Constructive Side-Channel Analysis and Secure Design ISBN: 9783030899141
COSADE
COSADE
Single-trace side-channel attacks are important attack vectors against the security of authenticated encryption schemes relying on an internal re-keying process, such as the NIST Lightweight Cryptography finalist ISAP. In a recent work of Kannwischer
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::79e5dddc1a1d38257108b7a4cd97234f
https://doi.org/10.1007/978-3-030-89915-8_8
https://doi.org/10.1007/978-3-030-89915-8_8
Publikováno v:
Lecture Notes in Computer Science, Vol. 13173, p. 64-79 (2021)
Smart Card Research and Advanced Applications ISBN: 9783030973476
Smart Card Research and Advanced Applications ISBN: 9783030973476
The evaluation of side-channel measurement setups and the impact they can have on physical security evaluations is a surprisingly under-discussed topic. In this paper, we initiate a comprehensive study of such setups for embedded software and hardwar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8e7fffbde195020b5d2410bc03274e3f
https://hdl.handle.net/2078.1/260814
https://hdl.handle.net/2078.1/260814
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783030684860
CARDIS
CARDIS
We complete the state-of-the-art on the side-channel security of real-world devices by analysing two 32-bit microcontrollers equipped with an unprotected co-processor. Our results show that (i) the lack of understanding of their hardware architecture
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::94e173063d62bd2b94c3dcc6060328e2
https://doi.org/10.1007/978-3-030-68487-7_7
https://doi.org/10.1007/978-3-030-68487-7_7
Autor:
Thomas Peters, Balazs Udvarhelyi, Friedrich Wiemer, Charles Momin, Chun Guo, Gregor Leander, Gaëtan Cassiers, Davide Bellizia, Gaëtan Leurent, Sébastien Duval, François-Xavier Standaert, Olivier Bronchain, Itamar Levi, Francesco Berti, Olivier Pereira
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
IACR Transactions on Symmetric Cryptology
IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process, 2020 (S1), pp.295--349. ⟨10.13154/tosc.v2020.iS1.295-349⟩
IACR Transactions on Symmetric Cryptology; Volume 2020, Special Issue 1 ; 295-349
IACR Transactions on Symmetric Cryptology, Vol. 2020, no.1, p. 295-349 (2020)
IACR Transactions on Symmetric Cryptology, 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process, 2020 (S1), pp.295--349. ⟨10.13154/tosc.v2020.iS1.295-349⟩
IACR Transactions on Symmetric Cryptology
IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process, 2020 (S1), pp.295--349. ⟨10.13154/tosc.v2020.iS1.295-349⟩
IACR Transactions on Symmetric Cryptology; Volume 2020, Special Issue 1 ; 295-349
IACR Transactions on Symmetric Cryptology, Vol. 2020, no.1, p. 295-349 (2020)
IACR Transactions on Symmetric Cryptology, 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process, 2020 (S1), pp.295--349. ⟨10.13154/tosc.v2020.iS1.295-349⟩
This paper defines Spook: a sponge-based authenticated encryption with associated data algorithm. It is primarily designed to provide security against side-channel attacks at a low energy cost. For this purpose, Spook is mixing a leakageresistant mod
Publikováno v:
Lecture Notes in Computer Science
Autor:
Shivam Bhasin, Thomas Roche
This book constitutes the proceedings of the 22nd International Conference on Smart Card Research and Advanced Applications, CARDIS 2023, held in Amsterdam, The Netherlands, during November 14–16, 2023.The 13 full papers presented in this volume we
Autor:
Helena Handschuh, Anna Lysyanskaya
The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The
Autor:
Helena Handschuh, Anna Lysyanskaya
The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The