International audienceHardware implementations of cryptographic algorithms can be beneficial from a performance point of view, but on the other hand they can be vulnerable to passive and active attacks, such laser fault injections. Several countermeasures have been proposed to defend against fault attacks, based on hardware, information, or temporal redundancy. Here, we discuss higher-order laser fault injections against an implementation of the Advanced Encryption Standard protected by the DDR temporal redundancy: this technique exploits both clock edges in order to speed up the computation, thus allowing for recomputation with limited latency penalty. Due to the more complex clock management, also the synchronization of the attack is more...
ISBN 978-1-4244-6965-9International audienceLaser-based fault injections are currently the most effi...
With the increasing popularity of embedded systems, security and privacy concerns poses a huge threa...
Nowadays, embedded systems and smart cards are part of everyday life. With the proliferation of thes...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
ISBN : 978-1-4244-1825International audienceCircuits used in security-related applications must be r...
Laser fault injection is one of the strongest fault injection techniques. It offers a precise area p...
ISBN : 978-3-540-46250-7International audienceThis paper proposes a practical fault attack on two as...
International audienceSecure integrated circuits that implement cryptographic algorithms (e.g., AES)...
Lightweight cryptography has been widely utilized in resource constrained embedded devices of Cyber-...
We propose a new laser injection attack Redshift that manipulates signal propagation delay, allowing...
International audienceLaser attacks, especially on circuits manufactured with recent deep submicron ...
International audienceProgrammable devices are an interesting alternative when implementing embedded...
Redundancy based countermeasures against fault attacks are a popular choice in security-critical com...
International audienceLaser fault injection through the front side (and consequently the metal-fills...
ISBN 978-1-4244-6965-9International audienceLaser-based fault injections are currently the most effi...
With the increasing popularity of embedded systems, security and privacy concerns poses a huge threa...
Nowadays, embedded systems and smart cards are part of everyday life. With the proliferation of thes...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
ISBN : 978-1-4244-1825International audienceCircuits used in security-related applications must be r...
Laser fault injection is one of the strongest fault injection techniques. It offers a precise area p...
ISBN : 978-3-540-46250-7International audienceThis paper proposes a practical fault attack on two as...
International audienceSecure integrated circuits that implement cryptographic algorithms (e.g., AES)...
Lightweight cryptography has been widely utilized in resource constrained embedded devices of Cyber-...
We propose a new laser injection attack Redshift that manipulates signal propagation delay, allowing...
International audienceLaser attacks, especially on circuits manufactured with recent deep submicron ...
International audienceProgrammable devices are an interesting alternative when implementing embedded...
Redundancy based countermeasures against fault attacks are a popular choice in security-critical com...
International audienceLaser fault injection through the front side (and consequently the metal-fills...
ISBN 978-1-4244-6965-9International audienceLaser-based fault injections are currently the most effi...
With the increasing popularity of embedded systems, security and privacy concerns poses a huge threa...
Nowadays, embedded systems and smart cards are part of everyday life. With the proliferation of thes...