Aujourd'hui, nous utilisons de plus en plus d'appareils "connectés" (téléphone portable, badge d'accès ou de transport, carte bancaire NFC, ...), et cette tendance ne va pas s'inverser. Ces appareils requièrent l'utilisation de primitives cryptographiques, embarquées dans des composants électroniques, dans le but de protéger les communications. Cependant, des techniques d'attaques permettent d'extraire de l'information du composant électronique ou fauter délibérément son fonctionnement. Un nouveau médium d'attaque, exploitant les ondes électromagnétiques est en pleine expansion. Ce médium, par rapport à des techniques de fautes à base de perturbations par faisceau LASER, propose l'avantage d’être à relativement faible coût. Nous présentons ...
Today, security of embedded devices is put in the limelight with the increasing market share of both...
Nowadays, most of the sectors in the industry rely on the use of electronic circuits and systems. Am...
Smart cards were born as a secure and powerfully built device. The main feature smart cards introduc...
Nowadays, our society is using more and more connected devices (cellphones, transport or access card...
En cryptographie classique, un algorithme de chiffrement est considéré comme une boîte noire, et un ...
Although the random number generation in a cryptographic system is a key element of the security cha...
International audienceTrue random number generators (TRNGs) are ubiquitous in data security as one o...
Un composant cryptographique ne se comporte pas comme coffre-fort : son activité interne échange via...
Nowadays the mathematical algorithms for cryptography are becoming safer and deemed unbreakable from...
International audienceMany side channels including power consumption, electromagnetic emanation, opt...
Caractérisation et Utilisation du Rayonnement Electromagnétique pour l'attaque de composants cryptog...
International audienceAbstract--Security of implementation of ciphers in hardware has already been w...
The arrival of the near field communications for transactions between portable remotely powered devi...
De nos jours, l'emploi de la cryptographie est largement répandu et les circuits intègrent des primi...
International audienceTrue random number generators (TRNGs) are ubiquitous in data security as one o...
Today, security of embedded devices is put in the limelight with the increasing market share of both...
Nowadays, most of the sectors in the industry rely on the use of electronic circuits and systems. Am...
Smart cards were born as a secure and powerfully built device. The main feature smart cards introduc...
Nowadays, our society is using more and more connected devices (cellphones, transport or access card...
En cryptographie classique, un algorithme de chiffrement est considéré comme une boîte noire, et un ...
Although the random number generation in a cryptographic system is a key element of the security cha...
International audienceTrue random number generators (TRNGs) are ubiquitous in data security as one o...
Un composant cryptographique ne se comporte pas comme coffre-fort : son activité interne échange via...
Nowadays the mathematical algorithms for cryptography are becoming safer and deemed unbreakable from...
International audienceMany side channels including power consumption, electromagnetic emanation, opt...
Caractérisation et Utilisation du Rayonnement Electromagnétique pour l'attaque de composants cryptog...
International audienceAbstract--Security of implementation of ciphers in hardware has already been w...
The arrival of the near field communications for transactions between portable remotely powered devi...
De nos jours, l'emploi de la cryptographie est largement répandu et les circuits intègrent des primi...
International audienceTrue random number generators (TRNGs) are ubiquitous in data security as one o...
Today, security of embedded devices is put in the limelight with the increasing market share of both...
Nowadays, most of the sectors in the industry rely on the use of electronic circuits and systems. Am...
Smart cards were born as a secure and powerfully built device. The main feature smart cards introduc...