Since the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun, entitled "Differential Power Analysis", the side-channel attacks have been proved to be efficient ways to attack cryptographic algorithms. Indeed, it has been revealed that the usage of information extracted from the side-channels such as the execution time, the power consumption or the electromagnetic emanations could be used to recover secret keys. In this context, we propose first, to treat the problem of dimensionality reduction. Indeed, since twenty years, the complexity and the size of the data extracted from the side-channels do not stop to grow. That is why the reduction of these data decreases the time and increases the efficiency o...
In the context of the CERN Large Hadron Collider (LHC), a large number of control systems have been ...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Fully homomorphic encryption is a kind of encryption offering the ability to manipulate encrypted da...
Cryptography is taking an ever more important part in the life of societies since the users are real...
Smart Cards are embedded computers making cryptographie operations in order to store confidential da...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
In forging industry, we want to decrease production costs, in order to obtain ther cheapest rate: to...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
We study ageing of materials at a microstructural level. In particular, defects such as vacancies, i...
Classical SAR Imagery algorithms or SAR processors are all based on the isotropic point model. When ...
In the context of the CERN Large Hadron Collider (LHC), a large number of control systems have been ...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Fully homomorphic encryption is a kind of encryption offering the ability to manipulate encrypted da...
Cryptography is taking an ever more important part in the life of societies since the users are real...
Smart Cards are embedded computers making cryptographie operations in order to store confidential da...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
In forging industry, we want to decrease production costs, in order to obtain ther cheapest rate: to...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
We study ageing of materials at a microstructural level. In particular, defects such as vacancies, i...
Classical SAR Imagery algorithms or SAR processors are all based on the isotropic point model. When ...
In the context of the CERN Large Hadron Collider (LHC), a large number of control systems have been ...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...