International audienceIn this paper we study the information leakage that may exist, due to electrical coupling, between logically independent blocks of a secure circuit as a new attack path to retrieve secret information. First, an AES-128 has been implemented on a FPGA board. Then, this AES implementation has been secured with a delay-based countermeasure against fault injection related to timing constraints violations. The countermeasure's detection threshold was supposed to be logically independent from the data handled by the cryptographic algorithm. Thus, it theoretically does not leak any information related to sensitive values. However experiments point out an existing correlation between the fault detection threshold of the counter...
The design of digital systems has its mainstay in the electronic design automation flows which act a...
The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated hardware ...
Advances in cryptography have enabled the features of confidentiality, security, and integrity on sm...
International audienceIn this paper we study the information leakage that may exist, due to electric...
International audienceAs FPGA use becomes more diverse, the shareduse of these devices becomes a sec...
In this paper, we present a new information leakage threat combining intentional electromagnetic int...
Side-channel attacks are nowadays a serious concern when implementing cryptographic algorithms. Powe...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
© 2017, Springer International Publishing AG. Masking schemes achieve provable security against side...
International audienceSecurity of cryptographic circuits is a major concern. Fault attacks are a mea...
Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for ...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
The design of digital systems has its mainstay in the electronic design automation flows which act a...
The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated hardware ...
Advances in cryptography have enabled the features of confidentiality, security, and integrity on sm...
International audienceIn this paper we study the information leakage that may exist, due to electric...
International audienceAs FPGA use becomes more diverse, the shareduse of these devices becomes a sec...
In this paper, we present a new information leakage threat combining intentional electromagnetic int...
Side-channel attacks are nowadays a serious concern when implementing cryptographic algorithms. Powe...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
© 2017, Springer International Publishing AG. Masking schemes achieve provable security against side...
International audienceSecurity of cryptographic circuits is a major concern. Fault attacks are a mea...
Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for ...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
The design of digital systems has its mainstay in the electronic design automation flows which act a...
The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated hardware ...
Advances in cryptography have enabled the features of confidentiality, security, and integrity on sm...