2020
DOI: 10.1186/s42400-020-0045-8
|View full text |Cite
|
Sign up to set email alerts
|

Efficient electro-magnetic analysis of a GPU bitsliced AES implementation

Abstract: The advent of CUDA-enabled GPU makes it possible to provide cloud applications with high-performance data security services. Unfortunately, recent studies have shown that GPU-based applications are also susceptible to side-channel attacks. These published work studied the side-channel vulnerabilities of GPU-based AES implementations by taking the advantage of the cache sharing among multiple threads or high parallelism of GPUs. Therefore, for GPU-based bitsliced cryptographic implementations, which are immune … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…With an EM-based SCA attack, Gao et al successfully broke the security of a bitsliced AES implementation on GPUs, otherwise immune to cache-based side channels [62]. Gao and Zhou targeted single instruction multiple threads (SIMT) execution on CUDA-enabled GPUs, accelerating an SBox LUT-based AES [61].…”
Section: Side-channel Analysismentioning
confidence: 99%
“…With an EM-based SCA attack, Gao et al successfully broke the security of a bitsliced AES implementation on GPUs, otherwise immune to cache-based side channels [62]. Gao and Zhou targeted single instruction multiple threads (SIMT) execution on CUDA-enabled GPUs, accelerating an SBox LUT-based AES [61].…”
Section: Side-channel Analysismentioning
confidence: 99%