The work summarizes author's three main results during the doctoral studies published at SAC '06 and CHES '09 conferences and the journal IET Information Security. The first two results are the side channel attacks on asymmetric schemes RSA and DSA. They are both based on the theory of lattices and are motivated by modern technologies such as Intel Pentium 4 HTT processor and the electronic passport. The last result is more technology related. It describes the method that provides optical side information and that was empoyed for the first time for the cryptanalytic purposes by the author. As an application, an attack on symmetric cipher AES running on a simple and widespread microcontroller PIC16F84A is presented
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
Side-channel cryptanalysis is a new research area in applied cryptography that has gained more and m...
Algebraic side-channel attacks (ASCA) are a method of cryptanalysis which allow performing key recov...
The work summarizes author's three main results during the doctoral studies published at SAC '06 and...
It is very difficult in real-time breaking the cryptographic algorithms used at present. The Classic...
Side-channel attacks refer to a particular form of cryptanalysis in which sensitive data is revealed...
Depuis les années 90, les attaques par canaux auxiliaires ont remis en cause le niveau de sécurité d...
Regarding the significant mathematical immunity of recent cryptographic algorithms, tem to achieve t...
International audienceThis chapter presents the main Side-Channel Attacks, a kind of hardware crypta...
Abstract--- A lot of devices which are daily used have to guarantee the retention of sensible data. ...
Side-channel attacks (SCA) are attacks launched by cyber attackers to uncover information from cry...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...
The need for security has gained more importance in this information intense society. Cryptography i...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
National audienceSecurity is a key component for information technologies and communication. Securit...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
Side-channel cryptanalysis is a new research area in applied cryptography that has gained more and m...
Algebraic side-channel attacks (ASCA) are a method of cryptanalysis which allow performing key recov...
The work summarizes author's three main results during the doctoral studies published at SAC '06 and...
It is very difficult in real-time breaking the cryptographic algorithms used at present. The Classic...
Side-channel attacks refer to a particular form of cryptanalysis in which sensitive data is revealed...
Depuis les années 90, les attaques par canaux auxiliaires ont remis en cause le niveau de sécurité d...
Regarding the significant mathematical immunity of recent cryptographic algorithms, tem to achieve t...
International audienceThis chapter presents the main Side-Channel Attacks, a kind of hardware crypta...
Abstract--- A lot of devices which are daily used have to guarantee the retention of sensible data. ...
Side-channel attacks (SCA) are attacks launched by cyber attackers to uncover information from cry...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...
The need for security has gained more importance in this information intense society. Cryptography i...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
National audienceSecurity is a key component for information technologies and communication. Securit...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
Side-channel cryptanalysis is a new research area in applied cryptography that has gained more and m...
Algebraic side-channel attacks (ASCA) are a method of cryptanalysis which allow performing key recov...