Abstract. Ensuring the physical security of small embedded devices is challenging. Such devices have to be produced under strong cost con-straints, and generally operate with limited power and energy budget. However, they may also be deployed in applications where physical access is indeed possible for adversaries. In this paper, we consider the case of SIM cards to discuss these issues, and report on successful side-channel attacks against several (old but still deployed) implementations of the COMP128-1 algorithm. Such attacks are able to recover cryptographic keys with limited time and data, by measuring the power consumption of the devices manipulating them, hence allowing cards cloning and com-munications eavesdropping. This study allo...
Atmel CryptoMemory devices offer non-volatile memory with access control and authenticated encryptio...
Smart medical devices will only be smart if they also in-clude technology to provide security and pr...
Embedded devices are nowadays largely represented across the compute continuum. From mobile phones t...
Side-channel attacks are an increasingly important concern for the security of cryptographic embedde...
The concept of power may be of fundamental importance in many application fields of cryptography. In...
Mobile appliances and especially smart cards have found more and more applications in the past two d...
This master thesis deals about the issues of chip cards’ side channels. Side channels are new method...
Smart cards were born as a secure and powerfully built device. The main feature smart cards introduc...
Abstract. Recent developments in information technologies made the secure transmission of digital da...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
Modern cryptography responds to the need for security that has arisen with the emergence of communic...
Abstract. We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio F...
Abstract. By shrinking the technology and reducing the energy require-ments of integrated circuits, ...
D.Ing. (Electrical Engineering)Abstract: Power Analysis or Side-Channel Attack aimed at embedded sys...
Atmel CryptoMemory devices offer non-volatile memory with access control and authenticated encryptio...
Smart medical devices will only be smart if they also in-clude technology to provide security and pr...
Embedded devices are nowadays largely represented across the compute continuum. From mobile phones t...
Side-channel attacks are an increasingly important concern for the security of cryptographic embedde...
The concept of power may be of fundamental importance in many application fields of cryptography. In...
Mobile appliances and especially smart cards have found more and more applications in the past two d...
This master thesis deals about the issues of chip cards’ side channels. Side channels are new method...
Smart cards were born as a secure and powerfully built device. The main feature smart cards introduc...
Abstract. Recent developments in information technologies made the secure transmission of digital da...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
Modern cryptography responds to the need for security that has arisen with the emergence of communic...
Abstract. We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio F...
Abstract. By shrinking the technology and reducing the energy require-ments of integrated circuits, ...
D.Ing. (Electrical Engineering)Abstract: Power Analysis or Side-Channel Attack aimed at embedded sys...
Atmel CryptoMemory devices offer non-volatile memory with access control and authenticated encryptio...
Smart medical devices will only be smart if they also in-clude technology to provide security and pr...
Embedded devices are nowadays largely represented across the compute continuum. From mobile phones t...