This thesis is devoted to efficient and secure implementations of lightweight symmetric cryptographic primitives for resource-constrained devices such as wireless sensors and actuators that are typically deployed in remote locations. In this setting, cryptographic algorithms must consume few computational resources and withstand a large variety of attacks, including side-channel attacks. The first part of this thesis is concerned with efficient software implementations of lightweight symmetric algorithms on 8, 16, and 32-bit microcontrollers. A first contribution of this part is the development of FELICS, an open-source benchmarking framework that facilitates the extraction of comparative performance figures from implementations of lightwe...
Our society greatly depends on services and applications provided by mobile communication networks. ...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
Symmetric key cryptographic primitives are essential to encrypt data and protect communication betwe...
This thesis is devoted to efficient and secure implementations of lightweight symmetric cryptographi...
Lightweight cryptography has been one of the ``hot topics'' in symmetric cryptography in the recent ...
Side-Channel Analysis (SCA) represents a serious threat to the security of millions of smart devices...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, observations of le...
In this thesis, I present the research I did with my co-authors on several aspects of symmetric cryp...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
In the era of IoT and ubiquitous computing, the collection and communication of sensitive data is in...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
Despite the worldwide adoption of cryptographic standards, the rise of Internet of Things creates a ...
International audienceFor constrained devices, standard cryptographic algorithms can be too big, too...
Our society greatly depends on services and applications provided by mobile communication networks. ...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
Symmetric key cryptographic primitives are essential to encrypt data and protect communication betwe...
This thesis is devoted to efficient and secure implementations of lightweight symmetric cryptographi...
Lightweight cryptography has been one of the ``hot topics'' in symmetric cryptography in the recent ...
Side-Channel Analysis (SCA) represents a serious threat to the security of millions of smart devices...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, observations of le...
In this thesis, I present the research I did with my co-authors on several aspects of symmetric cryp...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
In the era of IoT and ubiquitous computing, the collection and communication of sensitive data is in...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
Despite the worldwide adoption of cryptographic standards, the rise of Internet of Things creates a ...
International audienceFor constrained devices, standard cryptographic algorithms can be too big, too...
Our society greatly depends on services and applications provided by mobile communication networks. ...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
Symmetric key cryptographic primitives are essential to encrypt data and protect communication betwe...