Cryptography and security market is growing up at an annual rate of 17 % according to some recent studies. Cryptography is known to be the science of secret. It is based on mathematical hard problems as integers factorization, the well-known discrete logarithm problem. Although those problems are trusted, software or hardware implementations of cryptographic algorithms can suffer from inherent weaknesses. Execution time, power consumption (...) can differ depending on secret informations such as the secret key. Because of that, some malicious attacks could be used to exploit these weak points and therefore can be used to break the whole crypto-system. In this thesis, we are interested in protecting our physical device from the so called sid...
This paper presents the design and implementation of an elliptic curve cryptographic core to realize...
Protocols for asymmetric cryptography require arithmetic computations in several mathematical struct...
Cette thèse est consacrée à l'amélioration des aspects efficacité et sécurité de l'implémentation de...
Cryptography and security market is growing up at an annual rate of 17 % according to some recent st...
Cryptography and security market is growing up at a annual rate of 17% according to some recent stud...
La cryptographie et la problématique de la sécurité informatique deviennent des sujets de plus en pl...
Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standard...
This PhD thesis focuses on the study, the hardware design, the theoretical and practical validation,...
International audienceThe paper presents details on fast and secure GF (2^m) multipliers dedicated t...
The efficiency of devices performing arithmetic operations in finite field is crucial for the effici...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
This paper presents a high performance GF(2m) Elliptic Curve Cryptoprocessor architecture. The propo...
The elliptic curve cryptography can be observed as two levels of computations, upper scalar multipli...
Many applications require achieving high security level (confidentiality or integrity). My thesis is...
National audienceWe present our first results on the extension of computation accelerators designed ...
This paper presents the design and implementation of an elliptic curve cryptographic core to realize...
Protocols for asymmetric cryptography require arithmetic computations in several mathematical struct...
Cette thèse est consacrée à l'amélioration des aspects efficacité et sécurité de l'implémentation de...
Cryptography and security market is growing up at an annual rate of 17 % according to some recent st...
Cryptography and security market is growing up at a annual rate of 17% according to some recent stud...
La cryptographie et la problématique de la sécurité informatique deviennent des sujets de plus en pl...
Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standard...
This PhD thesis focuses on the study, the hardware design, the theoretical and practical validation,...
International audienceThe paper presents details on fast and secure GF (2^m) multipliers dedicated t...
The efficiency of devices performing arithmetic operations in finite field is crucial for the effici...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
This paper presents a high performance GF(2m) Elliptic Curve Cryptoprocessor architecture. The propo...
The elliptic curve cryptography can be observed as two levels of computations, upper scalar multipli...
Many applications require achieving high security level (confidentiality or integrity). My thesis is...
National audienceWe present our first results on the extension of computation accelerators designed ...
This paper presents the design and implementation of an elliptic curve cryptographic core to realize...
Protocols for asymmetric cryptography require arithmetic computations in several mathematical struct...
Cette thèse est consacrée à l'amélioration des aspects efficacité et sécurité de l'implémentation de...