2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2021
DOI: 10.1109/isvlsi51109.2021.00051
|View full text |Cite
|
Sign up to set email alerts
|

Side-channel Leakage Assessment Metrics: A Case Study of GIFT Block Ciphers

Abstract: Determination of an adequate level of security and providing subsequent mechanisms to achieve it, is one of the most pressing problems regarding embedded computing devices. While there are some solutions available for resource-rich computer systems, direct application of these solutions to resource-constrained environments are often unfeasible. The fundamental problem for such resource-constrained systems is the fact that current cryptographic algorithms utilize significant energy consumption and storage overh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…The hypothesis tested whether the gathered traces are truly random or if there is leakage present within traces. While this methodology can be beneficial and has been used recently to show side-channel vulnerabilities in some of the NIST lightweight cryptography round 2 candidate s-boxes [18,19], TVLA can have issues demonstrated by relatively high rates of false negatives or false positives, even when using different tests such as the Pearson χ 2 test [20].…”
Section: Sca Backgroundsmentioning
confidence: 99%
“…The hypothesis tested whether the gathered traces are truly random or if there is leakage present within traces. While this methodology can be beneficial and has been used recently to show side-channel vulnerabilities in some of the NIST lightweight cryptography round 2 candidate s-boxes [18,19], TVLA can have issues demonstrated by relatively high rates of false negatives or false positives, even when using different tests such as the Pearson χ 2 test [20].…”
Section: Sca Backgroundsmentioning
confidence: 99%
“…The study of [20] evaluates and analyses authenticated lightweight cipher WAGE vulnerability to CPA and compares it against LWC second round candidates. [23] focuses on the study of side channel leakage of GIFT‐COFB by applying CPA with the Hamming distance model. Then, they use the attack results to rate the reliability of several side‐channel leakage assessment metrics: transparency order, revisited transparency order, and signal‐to‐noise ratio, amongst others.…”
Section: Introductionmentioning
confidence: 99%