This thesis surveys the current state of the art of hash-based cryptography with a view to finding vulnerabilities related to side-channel attacks and fault attacks. For side-channel investigation, we analyzed the power consumption of an Arduino Due microcontroller running a custom ARM implementation of SPHINCS-256---the most advanced digital signature scheme based on hash functions. Simple power analysis (SPA) was applied on a single trace to obtain a first insight into the implementation, and then on multiple traces to identify an initial data dependence of the power consumption on the hash functions involved in the instance. Based on this result, differential power analysis (DPA), with difference of means, V-test, and Pearson correlation...
In this paper we propose a new hash-and-sign digital signature scheme whose security against existen...
In this paper, we investigate the security of the BLISS lattice-based signature scheme, one of the m...
International audienceIn this paper, we investigate the security of the BLISS lattice-based signatur...
The majority of currently deployed cryptographic public-key schemes are at risk of becoming insecure...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such...
Cryptographers and security experts around the world have been awakened to the reality that one day ...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
National audienceSecurity is a key component for information technologies and communication. Securit...
Hash-based signature (HBS) schemes are an efficient method of guaranteeing the authenticity of data ...
SPHINCS$^{+}$ is a state-of-the-art hash based signature scheme, the security of which is either bas...
Cryptographic hash functions are an omnipresent components in security-critical software and devices...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
Because they require no assumption besides the preimage or collision resistance of hash functions, h...
In this paper we propose a new hash-and-sign digital signature scheme whose security against existen...
In this paper, we investigate the security of the BLISS lattice-based signature scheme, one of the m...
International audienceIn this paper, we investigate the security of the BLISS lattice-based signatur...
The majority of currently deployed cryptographic public-key schemes are at risk of becoming insecure...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such...
Cryptographers and security experts around the world have been awakened to the reality that one day ...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
National audienceSecurity is a key component for information technologies and communication. Securit...
Hash-based signature (HBS) schemes are an efficient method of guaranteeing the authenticity of data ...
SPHINCS$^{+}$ is a state-of-the-art hash based signature scheme, the security of which is either bas...
Cryptographic hash functions are an omnipresent components in security-critical software and devices...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
Because they require no assumption besides the preimage or collision resistance of hash functions, h...
In this paper we propose a new hash-and-sign digital signature scheme whose security against existen...
In this paper, we investigate the security of the BLISS lattice-based signature scheme, one of the m...
International audienceIn this paper, we investigate the security of the BLISS lattice-based signatur...