: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorithms on embedded devices. Indeed, each electronic component produces physical emanations, such as the electromagnetic radiation, the power consumption or the execution time. Besides, these emanations reveal some information on the internal state of the computation. A wise attacker can retrieve secret data in the embedded device using the analyzes of the involuntary “leakage”, that is side channel attacks. This thesis focuses on the security evaluation of asymmetric cryptographic algorithm such as RSA and ECC. In these algorithms, the main leakages are observed on the modular multiplication. This thesis presents two attacks targeting the modular...
En cryptographie moderne, un système de chiffrement est traditionnellement étudié dans le modèle dit...
The number of electronic devices and wireless communication systems has significantly increased over...
The strong increase of the number of connected devices in recent years and the increasing use of com...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
Since the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun,...
The main objective of this PhD thesis is to speedup elliptic curve cryptography (ECC) computations, ...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
Version définitive de la thèse (dépôt Université)Intrusion detection aims to automate the detection ...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Smart Cards are embedded computers making cryptographie operations in order to store confidential da...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
In the context of the CERN Large Hadron Collider (LHC), a large number of control systems have been ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
From time immemorial, human beings have been forced to protect the fruits of their creativity and en...
The increasing complexity of distributed realtime and embedded (DRE) systems and their implication i...
En cryptographie moderne, un système de chiffrement est traditionnellement étudié dans le modèle dit...
The number of electronic devices and wireless communication systems has significantly increased over...
The strong increase of the number of connected devices in recent years and the increasing use of com...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
Since the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun,...
The main objective of this PhD thesis is to speedup elliptic curve cryptography (ECC) computations, ...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
Version définitive de la thèse (dépôt Université)Intrusion detection aims to automate the detection ...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Smart Cards are embedded computers making cryptographie operations in order to store confidential da...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
In the context of the CERN Large Hadron Collider (LHC), a large number of control systems have been ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
From time immemorial, human beings have been forced to protect the fruits of their creativity and en...
The increasing complexity of distributed realtime and embedded (DRE) systems and their implication i...
En cryptographie moderne, un système de chiffrement est traditionnellement étudié dans le modèle dit...
The number of electronic devices and wireless communication systems has significantly increased over...
The strong increase of the number of connected devices in recent years and the increasing use of com...