Algebraic side-channel attacks

M Renauld, FX Standaert - International Conference on Information …, 2009 - Springer
… these attacks can be successfully applied in general and to a large class of ciphers. In this
paper, we show that algebraic techniques can be combined with side-channel attacks in a …

Algebraic side-channel attacks on the AES: Why time also matters in DPA

M Renauld, FX Standaert… - International Workshop on …, 2009 - Springer
… But excepted for a slight reduction of the success rate, our results show that algebraic
side-channel attacks against the AES Rijndael are quite strongly immune against unknown inputs. …

Analysis of the algebraic side channel attack

C Carlet, JC Faugere, C Goyet, G Renault - Journal of Cryptographic …, 2012 - Springer
attack called algebraic side-channel attacks (ASCA). They showed that side-channel information
leads to effective algebraic attacks. … to characterize the algebraic phase of these attacks. …

Algebraic side-channel attacks beyond the hamming weight leakage model

Y Oren, M Renauld, FX Standaert, A Wool - Cryptographic Hardware and …, 2012 - Springer
Algebraic side-channel attacks (ASCA) are a method of crypt… In an ASCA, the side-channel
leaks of a device under test (DUT) … In an algebraic side-channel attack (ASCA), the attacker is …

Improved algebraic side-channel attack on AES

MSE Mohamed, S Bulygin, M Zohner… - … Security and Trust, 2012 - ieeexplore.ieee.org
… In this work we propose a more practical algebraic sidechannel attack, the so called
improved algebraic side-channel attack (IASCA). The contribution of IASCA is twofold. First, we …

Improved algebraic side-channel attack on AES

MSE Mohamed, S Bulygin, M Zohner, A Heuser… - Journal of Cryptographic …, 2013 - Springer
… In this paper, we present improvements of the algebraic side-channel analysis of the … more
practical algebraic side-channel attack, the so-called improved algebraic side-channel attack (…

Practical algebraic side-channel attacks against ACORN

A Adomnicai, L Masson, JJA Fournier - International Conference on …, 2018 - Springer
… key bits, the attack does not lead to a direct key recovery but returns a system of Boolean
equations to be solved. This kind of attack is called algebraic side-channel attack (ASCA) [12] …

Algebraic side channel attack on trivium and grain ciphers

AR Kazmi, M Afzal, MF Amjad, H Abbas, X Yang - IEEE Access, 2017 - ieeexplore.ieee.org
… Wool, “Practical templatealgebraic side channel attacks with extremely low data complexity,”
… Hao, “Error-tolerant algebraic side-channel attacks using bee,” in International Conference …

[PDF][PDF] Representation-, leakage-and cipher-dependencies in algebraic side-channel attacks

M Renauld, FX Standaert - Industrial track of ACNS, 2010 - dial.uclouvain.be
… By combining the extraction of side-channel information leakages with classical … introduced
Algebraic Side- Channel Attacks trade a part of the data complexity in standard DPA attacks

Algebraic side-channel analysis in the presence of errors

Y Oren, M Kirschbaum, T Popp, A Wool - Cryptographic Hardware and …, 2010 - Springer
… the basics of algebraic side-channel attacks. … attack methodology called Tolerant
Algebraic Side-Channel Analysis (TASCA). Our methodology transforms a single-trace side-channel