More and more sensitive data are stored inside smart cards, like bank account or car access codes. Recently, these security circuits have become a target for hackers who try to abuse these data. To achieve this goal, these attackers use the state of the art technologies like fault injection. To comply with the smart card market requirements, designers have to build protections against these attacks while keeping design costs as low as possible. These constraints should lead to a cost-efficient design and benefit from dedicated automatic protection methodologies. In this thesis we first study radiation sources able to tamper with silicon circuit behavior, and then we reveal similarities between laser attacks and radiation effects on a circui...
International audienceLaser shots on secure ICs have proven to be a very effective mean to perform f...
De nombreux aspects de notre vie courante reposent sur l'échange de données grâce à des systèmes de ...
New hardware cryptanalysis methods such as fault-based attacks have shown their efficiency to break ...
Nous confions de plus en plus d'informations confidentielles à nos cartes à puces, comme les codes d...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
From time immemorial, human beings have been forced to protect the fruits of their creativity and en...
Les circuits cryptographiques, parce qu'ils contiennent des informations confidentielles, font l'obj...
International audienceThe use of a laser as a means to inject errors during the computations of a se...
La minimisation de la consommation d'énergie est primordiale lors de la conception de circuits. Cepe...
ISBN : 978-1-4244-1825International audienceCircuits used in security-related applications must be r...
International audienceAmong all means to attack a security dedicated circuit, fault injection by mea...
De tout temps, l’Homme s’est vu contraint de protéger les fruits de sa créativité et les domaines co...
De nos jours, de plus en plus de circuits électroniques sont utilisés pour des usages critiques, tel...
ISBN : 978-3-9810801-2-4International audienceLasers can be used by hackers to situations to inject ...
International audienceLaser shots on secure ICs have proven to be a very effective mean to perform f...
De nombreux aspects de notre vie courante reposent sur l'échange de données grâce à des systèmes de ...
New hardware cryptanalysis methods such as fault-based attacks have shown their efficiency to break ...
Nous confions de plus en plus d'informations confidentielles à nos cartes à puces, comme les codes d...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
From time immemorial, human beings have been forced to protect the fruits of their creativity and en...
Les circuits cryptographiques, parce qu'ils contiennent des informations confidentielles, font l'obj...
International audienceThe use of a laser as a means to inject errors during the computations of a se...
La minimisation de la consommation d'énergie est primordiale lors de la conception de circuits. Cepe...
ISBN : 978-1-4244-1825International audienceCircuits used in security-related applications must be r...
International audienceAmong all means to attack a security dedicated circuit, fault injection by mea...
De tout temps, l’Homme s’est vu contraint de protéger les fruits de sa créativité et les domaines co...
De nos jours, de plus en plus de circuits électroniques sont utilisés pour des usages critiques, tel...
ISBN : 978-3-9810801-2-4International audienceLasers can be used by hackers to situations to inject ...
International audienceLaser shots on secure ICs have proven to be a very effective mean to perform f...
De nombreux aspects de notre vie courante reposent sur l'échange de données grâce à des systèmes de ...
New hardware cryptanalysis methods such as fault-based attacks have shown their efficiency to break ...