
all results are shown for attacking AES (Byte 5) im-
plemented on a SAKURA-G board FPGA for the
core supply voltage equal to 0.9 V (Left) and 1.6 V
(Right). More detail on the implementation / evalua-
tion setup is given in Sec. 6. The T-test, NICV, and
the correlation results shown in Fig. 1, 2, 3 will be
discussed further in this section.
2.2 Leakage Assessment Metrics
The T-test metric T is performed to assess whether
there are significant differences between two datasets.
This test determines whether the means of two distri-
butions (here value of ‘0’ vs ‘1’ in the key bits) are
statistically different, highlighting potential vulnera-
bilities. T-test is calculated using equation (2), where
X
1
and X
2
are the sample means, s
2
1
and s
2
2
are the
sample variances, and n
1
and n
2
are the sample sizes:
T =
X
1
− X
2
r
s
2
1
n
1
+
s
2
2
n
2
. (2)
Figure 1 shows the T-test results applied to the
power traces of the targeted circuit operating in dif-
ferent voltages. Here, the mean of all T-test values
calculated for each bit individually. As depicted lower
V
dd
values result in lower T-test metrics, while higher
V
dd
yields higher T-test metrics; confirming that the
leakage increases in higher voltages.
The NICV metric is to evaluate the variance be-
tween classes in relation to the total variance indicat-
ing the extent to which an attacker can differentiate
the classes. It is calculated via Eq. (3), where
X
c
is
mean of class c, X is overall mean, n
c
is number of
samples in class c, X
i
is i-th sample, C is total number
of classes, and N is total number of samples.
NICV =
∑
C
c=1
n
c
(X
c
− X)
2
∑
N
i=1
(X
i
− X)
2
. (3)
Similar to the T-test results, the NICV data pre-
sented in Fig. 2 show a comparable trend. Lower V
dd
levels correspond to lower NICV values, while higher
V
dd
levels result in higher NICV values, indicating a
potential increase in leakage with rising voltage.
To show the impact of voltage from an offensive
perspective, we conducted CPA attacks at two oper-
ating voltages. The CPA consists in computing the
Pearson correlation coefficient between the traces X
i
and a leakage model M
i,k
(indexed by a key byte hy-
pothesis k ∈ {0,.. .,255}):
CPA
k
=
∑
N
i=1
(X
i
− X) · (M
i,k
− M
k
)
q
∑
N
i=1
(X
i
− X)
2
∑
N
i=1
(M
i,k
− M
k
)
2
. (4)
CPA attack proper consists in guessing the most likely
key
ˆ
k as that which maximizes the coefficient CPA
k
:
ˆ
k = argmax
k
CPA
k
.
Figure 3 depict the maximum correlation values for
each possible key across varying trace numbers. The
red plot represents the correct key k
∗
, while the blue
plots represent other key guesses k ̸= k
∗
. As observed,
similar to the T-test and NICV findings, lower volt-
ages require more traces to leak the key, while higher
voltages require fewer traces, confirming increased
vulnerability to CPA attacks at higher voltages.
Motivated by the above discussion and results, we
use operating voltage as a key metric for achieving
security and determining key refreshing frequency.
2.3 Threat Model
In our threat model, the adversary has physical access
to the targeted cryptographic device and is able to col-
lect power traces to extract keys. The adversary aims
to manipulate the operating voltage V
dd
within per-
missible ranges to facilitate key recovery, i.e., using
fewer traces. For example, as shown in Fig. 3, recov-
ering keys at 0.9 V requires 4600 traces, whereas at
1.6 V, only 1100 traces are needed, indicating signifi-
cantly faster key recovery at the latter case. Note that
to avoid triggering fault detection mechanisms imple-
mented by the designer, the adversary does not change
the operating voltage in a way that induces faults.
3 PREVIOUS WORK
SCA attacks extract cryptographic keys at run time by
observing power consumption, electromagnetic em-
anation, etc. Masking and hiding countermeasures
offer only partial protection and add time or com-
plexity overheads. Fresh re-keying schemes, which
periodically update the key to limit side-channel ex-
posure, have thus gained prominence. Medwed et
al.(Medwed et al., 2010) proposed separating a “re-
keying function” from the main cryptographic func-
tion (e.g., block cipher), but power analysis can still
leak the master key. To address this,(Xi et al., 2018)
uses a PUF, specifically the Subthreshold Current Ar-
ray PUF, for in-operation key updates, though it re-
quires network-wide synchronization.
Lattice-based re-keying was proposed in (Dziem-
bowski et al., 2016), proven secure under high noise,
which may not always hold. This was secured even
in (Duval et al., 2021) against noise-free measure-
ments, albeit with added computational overhead.
SECRYPT 2025 - 22nd International Conference on Security and Cryptography
374