International audienceThe security issues of devices, used in the Internet of Things (IoT) for example, can be considered in two contexts. On the one hand, these algorithms can be proven secure mathematically. On the other hand, physical attacks can weaken the implementation. In this work, we want to compare these attacks between them. A tool to evaluate and compare different physical attacks, by separating the theoretical attack path and the experimental parts of the attacks, is presented
A cryptographic primitive can be considered from two points of view: on the one hand, it can be view...
We apply formal methods to lay and streamline theoretical foundations to reason about Cyber-Physical...
During this thesis, we focused on the security of mobile devices. To do this, we explored physical a...
International audienceThe security issues of devices, used in the Internet of Things (IoT) for examp...
Technical reportThe security of cryptographic algorithms can be considered in two contexts. On the o...
International audienceSecurity is a key component for information technologies and communication. Am...
iii Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weak...
Cette thèse se situe dans la cryptanalyse physique des algorithmes de chiffrement par blocs. Un algo...
The security of a cryptosystem is often compromised, not from a theoretical point of view, but by th...
International audienceSecurity is a key component for information technologies and communication. Am...
International audiencePhysical attacks on cryptographic circuits were first identified in the late 1...
This thesis argues that cyber-physical systems are, by their very nature, at risk from physical-laye...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long stand...
This thesis is dedicated to models and algorithms for the use in physical cryptanalysis which is a n...
A cryptographic primitive can be considered from two points of view: on the one hand, it can be view...
We apply formal methods to lay and streamline theoretical foundations to reason about Cyber-Physical...
During this thesis, we focused on the security of mobile devices. To do this, we explored physical a...
International audienceThe security issues of devices, used in the Internet of Things (IoT) for examp...
Technical reportThe security of cryptographic algorithms can be considered in two contexts. On the o...
International audienceSecurity is a key component for information technologies and communication. Am...
iii Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weak...
Cette thèse se situe dans la cryptanalyse physique des algorithmes de chiffrement par blocs. Un algo...
The security of a cryptosystem is often compromised, not from a theoretical point of view, but by th...
International audienceSecurity is a key component for information technologies and communication. Am...
International audiencePhysical attacks on cryptographic circuits were first identified in the late 1...
This thesis argues that cyber-physical systems are, by their very nature, at risk from physical-laye...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long stand...
This thesis is dedicated to models and algorithms for the use in physical cryptanalysis which is a n...
A cryptographic primitive can be considered from two points of view: on the one hand, it can be view...
We apply formal methods to lay and streamline theoretical foundations to reason about Cyber-Physical...
During this thesis, we focused on the security of mobile devices. To do this, we explored physical a...