An information-theoretic approach to side-channel analysis

S Shintre - 2015 - search.proquest.com
Side-channels are unanticipated information flows that present a significant threat to security
of systems. Quantitative analyses are required to measure the rate of information leakage …

An Information-Theoretic Approach to Practical Side Channel Protection

BH Wu - 2021 - search.proquest.com
Side channel attacks are quickly becoming a serious problem in many computational
security contexts. Presently, side channel countermeasures are primarily developed per …

What can information guess?: Towards information leakage quantification in side-channel analysis

W Cheng - 2021 - theses.hal.science
Cryptographic algorithms are nowadays prevalent in establishing secure connectivity in our
digital society. Such computations handle sensitive information like encryption keys, which …

Implementation of a side channel cryptanalysis profiling tool based on stochastic modelling

M Aragonés De Ferrater - 2023 - upcommons.upc.edu
Side-channel attacks are passive attacks focused on the derivation of secrets from the
analysis of information leaks through unintended communication channels such as power …

Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures

A Spence, S Bangay - International Journal of Information Security, 2022 - Springer
Side-channels are unintended pathways within target systems that leak internal information,
exploitable via side-channel attack techniques that extract the target information …

Theoretical and practical aspects of mutual information based side channel analysis

E Prouff, M Rivain - Applied Cryptography and Network Security: 7th …, 2009 - Springer
A large variety of side channel analyses performed on embedded devices involve the linear
correlation coefficient as wrong-key distinguisher. This coefficient is actually a sound …

[PDF][PDF] Side Channel Leakage Analysis

X Ye - 2014 - digital.wpi.edu
Nearly twenty years ago the discovery of side channel attacks has warned the world that
security is more than just a mathematical problem. Serious considerations need to be placed …

Adaptive channel estimation in side channel attacks

S Jin, R Bettati - … on Information Forensics and Security (WIFS), 2018 - ieeexplore.ieee.org
Side channel attacks exploit physical information that leaks from the target implementations
to extract secret information, for example keys. Since the observable physical leakages are …

Comprehensive Study of Side-Channel Analysis (CyberSecurity)

ZM Obaid, KMA Alheeti - 2023 16th International Conference on …, 2023 - ieeexplore.ieee.org
In the ever-evolving environment of digital security, the value of cryptographic systems in
preserving data and communications cannot be emphasized. However, the introduction of …

Tools for the evaluation and choice of countermeasures against side-channel attacks

G Doychev - 2016 - oa.upm.es
Side-channel attacks have been successful in breaking cryptographic protections of
systems, by using secret-dependent variations of non-functional properties such as timing or …