Side-Channel Evaluation Methodology on Software

Cryptographic implementations need to be robust amidst the widespread use of crypto-libraries and attacks targeting their implementation, such as side-channel attacks (SCA). Many certification schemes, such as Common Criteria and FIPS 140, continue without addressing side-channel flaws. Research wor...

Full description

Bibliographic Details
Main Authors: Sylvain Guilley, Khaled Karray, Thomas Perianin, Ritu-Ranjan Shrivastwa, Youssef Souissi, Sofiane Takarabt
Format: Article
Language:English
Published: MDPI AG 2020-09-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/4/4/27