International audienceCryptographic algorithms are used to protect sensitive information from untrusted parties when the communication medium is not secure. Many secure systems such as smartcards include hardware implementation of symmetric cryptographic algorithms such as (Triple) Data Encryption Standard and Advanced Encryption Standard. The secret keys used to encrypt the data with these algorithms are large enough to prevent any brute force attack that consists in exploring the whole solution space. However, the hardware implementation of these cryptographic algorithms allows the hackers to measure the observable characteristics of the physical implementation and deduce the secret key (side‐channel attacks). The key can even be discover...
International audienceScan-based design-for-testability, which improves access and thus the test qua...
The latest innovation technology in computing devices has given a rise of compact, speedy and econom...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
International audienceCryptographic algorithms are used to protect sensitive information from untrus...
National audienceCrypto-processors are the target of attacks. For instance, an attacker may exploit ...
Abstract — Hardware implementation of cryptographic algorithms is subject to various attacks. It has...
Relying on a recently developed gate-level information assurance scheme, we formally analyze the sec...
Dans cette thèse, nous analysons les vulnérabilités introduites par les infrastructures de test, com...
Scan chain-based attacks are side-channel attacks focusing on one of the most significant features o...
International audienceTesting a secure system is often considered as a severe bottleneck. While test...
Abstract—Hardware implementation of cryptographic algorithms is subject to various attacks. It has b...
Scan techniques are almost mandatorily adopted in designing current System-on-a-Chip (SoC) to enhanc...
Scan attacks exploit facilities offered by scan chains to retrieve embedded secret data, in particu...
International audienceThe design of secure ICs requires fulfilling means conforming to many design r...
International audienceScan attacks exploit facilities offered by scan chains to retrieve embedded se...
International audienceScan-based design-for-testability, which improves access and thus the test qua...
The latest innovation technology in computing devices has given a rise of compact, speedy and econom...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
International audienceCryptographic algorithms are used to protect sensitive information from untrus...
National audienceCrypto-processors are the target of attacks. For instance, an attacker may exploit ...
Abstract — Hardware implementation of cryptographic algorithms is subject to various attacks. It has...
Relying on a recently developed gate-level information assurance scheme, we formally analyze the sec...
Dans cette thèse, nous analysons les vulnérabilités introduites par les infrastructures de test, com...
Scan chain-based attacks are side-channel attacks focusing on one of the most significant features o...
International audienceTesting a secure system is often considered as a severe bottleneck. While test...
Abstract—Hardware implementation of cryptographic algorithms is subject to various attacks. It has b...
Scan techniques are almost mandatorily adopted in designing current System-on-a-Chip (SoC) to enhanc...
Scan attacks exploit facilities offered by scan chains to retrieve embedded secret data, in particu...
International audienceThe design of secure ICs requires fulfilling means conforming to many design r...
International audienceScan attacks exploit facilities offered by scan chains to retrieve embedded se...
International audienceScan-based design-for-testability, which improves access and thus the test qua...
The latest innovation technology in computing devices has given a rise of compact, speedy and econom...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...