Les attaques par canaux auxiliaires telles que l'analyse différentielle de la consommation de courant (DPA) et l'analyse différentielle des émissions électromagnétiques (DEMA) constituent une menace sérieuse pour la sécurité des systèmes embarqués. L'objet de cette thèse est d'étudier les vulnérabilités des implantations logicielles des algorithmes cryptographiques face à ces attaques pour concevoir un processeur d'un nouveau type. Pour cela, nous commençons par identifier les différents éléments des processeurs embarqués qui peuvent être exploités pour obtenir des informations secrètes. Puis, nous introduisons des stratégies qui privilégient un équilibre entre performance et sécurité pour protéger de telles architectures au niveau transfer...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
Embedded systems are specialized platforms consisting of hardware and software used in a wide range ...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
The security of modern embedded systems has been the subject of intensive research in engineering ar...
Embedded security applications are diverse and at the center of all personal embedded applications. ...
Advancements in technology, the need for automation and ease of manufacturability, have made embedde...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
This thesis develops an overview of the so called Side Channel Attacks (SCA). In order to counter th...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
Les attaques par canaux cachés telles que les attaques par analyse de la consommation sont une menac...
The advancement of digital silicon technology brings a variety of novel embedded systems to our dail...
Side-Channel Analysis (SCA) and Fault Attacks (FA) are techniques to recover sensitive information i...
Les attaques en fautes (FA) et par canaux cachés (SCA), permettent de récupérer des données sensible...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
Embedded systems are specialized platforms consisting of hardware and software used in a wide range ...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
The security of modern embedded systems has been the subject of intensive research in engineering ar...
Embedded security applications are diverse and at the center of all personal embedded applications. ...
Advancements in technology, the need for automation and ease of manufacturability, have made embedde...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
This thesis develops an overview of the so called Side Channel Attacks (SCA). In order to counter th...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
Les attaques par canaux cachés telles que les attaques par analyse de la consommation sont une menac...
The advancement of digital silicon technology brings a variety of novel embedded systems to our dail...
Side-Channel Analysis (SCA) and Fault Attacks (FA) are techniques to recover sensitive information i...
Les attaques en fautes (FA) et par canaux cachés (SCA), permettent de récupérer des données sensible...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
Embedded systems are specialized platforms consisting of hardware and software used in a wide range ...