This thesis deals with physical attacks on implementations of cryptographic algorithms and countermeasures against these attacks. Physical attacks exploit properties of an implementation to recover secret cryptographic keys. Particularly vulnerable to physical attacks are embedded devices. In the area of side-channel analysis, this thesis addresses attacks that exploit observations of power consumption or electromagnetic leakage of the device and target symmetric cryptographic algorithms. First, this work proposes a new combination of two well-known attacks that is more efficient than each of the attacks individually. Second, this work studies attacks exploiting leakage induced by microprocessor cache mechanism, suggesting an algorithm tha...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
National audienceSecurity is a key component for information technologies and communication. Securit...
Technical reportThe security of cryptographic algorithms can be considered in two contexts. On the o...
International audienceSecurity is a key component for information technologies and communication. Am...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
This thesis is dedicated to models and algorithms for the use in physical cryptanalysis which is a n...
The advancement of digital silicon technology brings a variety of novel embedded systems to our dail...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
The security of a cryptosystem is often compromised, not from a theoretical point of view, but by th...
A recent branch of cryptography focuses on the physical constraints that a real-life cryptographic d...
Sensitive systems that are based on smart cards use well-studied and well-developed cryptosystems. G...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
National audienceSecurity is a key component for information technologies and communication. Securit...
Technical reportThe security of cryptographic algorithms can be considered in two contexts. On the o...
International audienceSecurity is a key component for information technologies and communication. Am...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
This thesis is dedicated to models and algorithms for the use in physical cryptanalysis which is a n...
The advancement of digital silicon technology brings a variety of novel embedded systems to our dail...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
The security of a cryptosystem is often compromised, not from a theoretical point of view, but by th...
A recent branch of cryptography focuses on the physical constraints that a real-life cryptographic d...
Sensitive systems that are based on smart cards use well-studied and well-developed cryptosystems. G...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...