International audienceSide-channel attacks are a serious threat against secret data involved in cryptographic calculations , as for instance pairing-based cryptography which is a promising tool for the IoT. We focus our work on Correlation Power Analysis (CPA) attack against a pairing implementation. We improve a vertical side-channel analysis attack and propose the first horizontal attack against a pairing implementation. First, we present a characterization of the multiplication that allows us to reduce by a factor of ten the number of side-channel traces required in order to perform a CPA attack against an implementation of Ate pairing. Secondly , we successfully attack the same implementation with only one trace by using the first horiz...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
Abstract. We show that a randomized addition-subtraction chains countermeasure against side channel ...
Article published in the proceedings of the C2SI conference, May 2015.Pairings are mathematical tool...
International audienceSide-channel attacks are a serious threat against secret data involved in cryp...
International audienceThe field of Pairing Based Cryptography (PBC) has seen recent advances in the ...
This thesis focuses on the resistance of Pairing implementations againstside channel attacks. Pairin...
The lattice-based cryptography problems are known to be secure against the quantum computing attacks...
Abstract. The protection of cryptographic implementations against higher-order attacks has risen to ...
Side-Channel Attack (SCA) is an emerging technique to reveal the secret key of crypto-devices by ana...
Determination of an adequate level of security and providing subsequent mechanisms to achieve it, is...
Cette thèse est consacrée à l’étude de la sécurité physique des algorithmesde couplage. Les algorith...
© Springer International Publishing AG 2017. Single-trace side-channel attacks are a serious threat ...
Horizontal collision correlation analysis (HCCA) imposes a serious threat to simple power analysis r...
Power Analysis has been widely studied since Kocher et al. presented in 1998 the initial Simple and ...
Recently, the side channel keeps the attention of researchers in theory of pairing, since, several s...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
Abstract. We show that a randomized addition-subtraction chains countermeasure against side channel ...
Article published in the proceedings of the C2SI conference, May 2015.Pairings are mathematical tool...
International audienceSide-channel attacks are a serious threat against secret data involved in cryp...
International audienceThe field of Pairing Based Cryptography (PBC) has seen recent advances in the ...
This thesis focuses on the resistance of Pairing implementations againstside channel attacks. Pairin...
The lattice-based cryptography problems are known to be secure against the quantum computing attacks...
Abstract. The protection of cryptographic implementations against higher-order attacks has risen to ...
Side-Channel Attack (SCA) is an emerging technique to reveal the secret key of crypto-devices by ana...
Determination of an adequate level of security and providing subsequent mechanisms to achieve it, is...
Cette thèse est consacrée à l’étude de la sécurité physique des algorithmesde couplage. Les algorith...
© Springer International Publishing AG 2017. Single-trace side-channel attacks are a serious threat ...
Horizontal collision correlation analysis (HCCA) imposes a serious threat to simple power analysis r...
Power Analysis has been widely studied since Kocher et al. presented in 1998 the initial Simple and ...
Recently, the side channel keeps the attention of researchers in theory of pairing, since, several s...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
Abstract. We show that a randomized addition-subtraction chains countermeasure against side channel ...
Article published in the proceedings of the C2SI conference, May 2015.Pairings are mathematical tool...