Skip to content
  • Products
    • Protection of AI-Models
    • Root of Trust (RoT)
    • Software Libraries
      • FortiCrypt Library – Advanced DPA- and FIA-Resistant Software Library
      • FortiMac library – Advanced HMAC SHA2 DPA- and FIA-Resistant Software Library
    • Security Cryptographic HW IP Cores
      • FortiCrypt
        • AES XP-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra High Bandwidth FortiCrypt AES IP Core
        • AES ULP-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra Low Power FortiCrypt AES IP Core
        • AES UC-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra Compact FortiCrypt AES IP Core
        • AES SX-DPA-FIA IP Core – DPA- and FIA-Resistant Balanced FortiCrypt AES IP Core
        • FortiCrypt Library – Advanced DPA- and FIA-Resistant Software Library
      • FortiMac
        • HMAC-SHA2-DPA-FIA IP Core – Advanced DPA- and FIA-Resistant FortiMac HMAC SHA2 IP Core
        • FortiMac library – Advanced HMAC SHA2 DPA- and FIA-Resistant Software Library
      • FortiPKA
        • FortifyIQ | Public Key Accelerator (PKA)
        • FortiPKEx
    • EDA Tools for Security Assessment and Verification
      • SideChannel Studio
      • FaultInjection Studio
    • Professional Services
  • Industry
    • Healthcare
  • Insights
    • Conference Papers
    • Whitepapers
    • Explanatory Videos
  • News
  • Company
    • About Us
    • Services
    • Our Team
    • Careers
  • Contact Us
  • Products
    • Protection of AI-Models
    • Root of Trust (RoT)
    • Software Libraries
      • FortiCrypt Library – Advanced DPA- and FIA-Resistant Software Library
      • FortiMac library – Advanced HMAC SHA2 DPA- and FIA-Resistant Software Library
    • Security Cryptographic HW IP Cores
      • FortiCrypt
        • AES XP-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra High Bandwidth FortiCrypt AES IP Core
        • AES ULP-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra Low Power FortiCrypt AES IP Core
        • AES UC-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra Compact FortiCrypt AES IP Core
        • AES SX-DPA-FIA IP Core – DPA- and FIA-Resistant Balanced FortiCrypt AES IP Core
        • FortiCrypt Library – Advanced DPA- and FIA-Resistant Software Library
      • FortiMac
        • HMAC-SHA2-DPA-FIA IP Core – Advanced DPA- and FIA-Resistant FortiMac HMAC SHA2 IP Core
        • FortiMac library – Advanced HMAC SHA2 DPA- and FIA-Resistant Software Library
      • FortiPKA
        • FortifyIQ | Public Key Accelerator (PKA)
        • FortiPKEx
    • EDA Tools for Security Assessment and Verification
      • SideChannel Studio
      • FaultInjection Studio
    • Professional Services
  • Industry
    • Healthcare
  • Insights
    • Conference Papers
    • Whitepapers
    • Explanatory Videos
  • News
  • Company
    • About Us
    • Services
    • Our Team
    • Careers
  • Contact Us
Contact Us
Read More
Read More
Read More
Read More
  • Conference Papers
  • Whitepapers
  • Videos
  • Conference Papers
  • Whitepapers
  • Videos

Conference Papers

Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2

In this paper, FortifyIQ introduces Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes involving arithmetical addition. This methodology is applied to what is believed to...

In this paper, FortifyIQ introduces Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes involving arithmetical addition. This methodology is applied to what is believed to be the first published full-fledged attack on HMAC-SHA-2 which does not require a profiling stage.

Read more
First Full-Fledged
Side Channel Attack
on HMAC-SHA-2

FortifyIQ presents a novel practical template attack on HMAC-SHA-2 intended primarily against its implementations in hardware. Side-channel attacks pose a threat to cryptographic algorithms. HMAC is an important use case...

FortifyIQ presents a novel practical template attack on HMAC-SHA-2 intended primarily against its implementations in hardware. Side-channel attacks pose a threat to cryptographic algorithms. HMAC is an important use case of a hash function, in which the input is partially secret and thus unknown to the attacker. Despite a few publications that discuss applications of power analysis techniques to attack HMAC-SHA-2, this is the first generic method that shows a full attack on its hardware implementation.

Read more
RAMBAM: A New Very Compact and Efficient Protection of AES against SC and FI attacks

This is an academic paper describing a protection method for AES which is very efficient, and configurable for any application. It introduces RAMBAM, an innovative algebraic masking technique designed to...

This is an academic paper describing a protection method for AES which is very efficient, and configurable for any application. It introduces RAMBAM, an innovative algebraic masking technique designed to protect against side-channel attacks and SIFA1. 

Read more
STORM— Small Table Oriented Redundancy-based SCA Mitigation for AES

STORM effectively solves the long-standing challenge of combining high security against SCA with low gate count and high performance for AES implementations by offering a different tradeoff (memory utilization) that...

STORM effectively solves the long-standing challenge of combining high security against SCA with low gate count and high performance for AES implementations by offering a different tradeoff (memory utilization) that may be preferable to RAMBAM in many practical cases.

Read more
Explore More

Whitepapers

HOW TO STEAL A GLOBAL COMPANY’S BUSINESS BY BREAKING INTO JUST ONE OF THEIR DEVICES

Discover a new approach to developing protection for smart cards against Differential Power Analysis (DPA) attacks,

Discover a new approach to developing protection for smart cards against Differential Power Analysis (DPA) attacks, allowing manufacturers to cut protection costs and save time during development.

Read more
GLOBAL CRYPTOGRAPHIC KEYS IN THE IOT WORLD AND THE THREATS THEY PRESENT

Of the various kinds of side-channel attacks, Differential Power Analysis (DPA) is the cheapest to deploy

Of the various kinds of side-channel attacks, Differential Power Analysis (DPA) is the cheapest to deploy with potentially the highest amount of damage to the manufacturer. What can be done to protect IoT devices from such attacks?

Read more
THE HARDWARE SECURITY DILEMMA

FortifyIQ offers a complete suite of solutions for DPA, SPA and FI detection, analysis, and recommendations

FortifyIQ offers a complete suite of solutions for DPA, SPA and FI detection, analysis, and recommendations for protecting your microchips and products from successful DPA and FI attacks.

Read more
HOW TO GAIN UNAUTHORIZED ENTRY, MAKE UNAUTHORIZED PURCHASES, AND GET FREE RIDES

Explore FortifyIQ’s AES with RAMBAM protection, providing top-tier defense against side-channel and fault injection attacks.

Explore FortifyIQ’s AES with RAMBAM protection, providing top-tier defense against side-channel and fault injection attacks.

Read more
Explore more

Whitepapers

Explore FortifyIQ’s AES with RAMBAM protection, providing top-tier defense against side-channel and fault injection attacks.

Read more

FortifyIQ offers a complete suite of solutions for DPA, SPA and FI detection, analysis, and recommendations for protecting your microchips and products from successful DPA and FI attacks.

Read more

Of the various kinds of side-channel attacks, Differential Power Analysis (DPA) is the cheapest to deploy with potentially the highest amount of damage to the manufacturer. What can be done to protect IoT devices from such attacks?

Read more

Discover a new approach to developing protection for smart cards against Differential Power Analysis (DPA) attacks, allowing manufacturers to cut protection costs and save time during development.

Read more
Explore More

Videos

Attackers can now breach your device for just a few hundred dollars unless robust security measures are in place. Watch our webinar to learn how our solution ensures you no longer have to compromise between security and functionality.
Watch now
SEMISRAEL Tech Webinar
Get a deep dive into the world of FortifyIQ’s protected IP cores and ultra-high bandwidth engines based on these IP cores. Learn all about the different core configurations and much more in this introductory video.
Watch now
FortifyIQ protected IP introduction
Learn how SideChannel Studio helps you find the source of side-channel leakage through a series of explanatory screenshots. Watch this detailed video now!
Watch now
FortifyIQ SideChannel Studio Analysis Results
Explore More
  • Insights
  • News
  • Company
Hardware-Security
IP Foundation:
From IoT to Cloud
Side-Channel and Fault Injection
Protection with FortifyIQ

81 Washington Street, Suite #307

Salem, MA 01970

USA

© 2025 FortifyIQ, Inc.

  • Terms & Conditions
  • Cookie Policy
  • Privacy Policy