In a world full of threats, the development of widespread digital applications has led to the need for a practical device containing cryptographic functions that provide the everyday needs for secure transactions, confidentiality of communications, identification of the subject or authentication for access to a particular service. Among the cryptographic embedded devices ensuring these functionalities, smart cards are certainly the most widely used. Their portability (a wallet may easily contain a dozen) and their ability to protect its data and programs against intruders, make it as the ideal “bunker” for key storage and the execution of cryptographic functions during mobile usage requiring a high level of security.Whilst the design of mat...
Embedded security applications are diverse and at the center of all personal embedded applications. ...
Les systèmes cryptographiques à base de courbes elliptiques sont aujourd'hui de plus en plus employé...
Ces travaux de thèse se concentrent sur l'étude des attaques par canaux cachés et les implications s...
In a world full of threats, the development of widespread digital applications has led to the need f...
The subject of this thesis is the security analysis of cryptographic implementations. The need for s...
This thesis focuses on the effects of attacks by physical faults on embedded source code specificall...
Elliptic curve based cryptosystems are nowadays increasingly used in protocols involving public-key ...
Elliptic Curve Cryptography (ECC) has gained much importance in smart cards because of its higher sp...
Embedded systems are ubiquitous and they have more and more applications. Most actual industrial fie...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
Les attaques par canaux auxiliaires sont des méthodes extrêmement puissantes pour obtenir les secret...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
La cryptographie prend une place de plus en plus importante dans la vie des sociétés depuis que ses ...
La Cryptographie sur les Courbes Elliptiques (abréviée ECC de l'anglais Elliptic Curve Cryptography)...
This thesis, on the border between information security and cryptography, focuses on the use of info...
Embedded security applications are diverse and at the center of all personal embedded applications. ...
Les systèmes cryptographiques à base de courbes elliptiques sont aujourd'hui de plus en plus employé...
Ces travaux de thèse se concentrent sur l'étude des attaques par canaux cachés et les implications s...
In a world full of threats, the development of widespread digital applications has led to the need f...
The subject of this thesis is the security analysis of cryptographic implementations. The need for s...
This thesis focuses on the effects of attacks by physical faults on embedded source code specificall...
Elliptic curve based cryptosystems are nowadays increasingly used in protocols involving public-key ...
Elliptic Curve Cryptography (ECC) has gained much importance in smart cards because of its higher sp...
Embedded systems are ubiquitous and they have more and more applications. Most actual industrial fie...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
Les attaques par canaux auxiliaires sont des méthodes extrêmement puissantes pour obtenir les secret...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
La cryptographie prend une place de plus en plus importante dans la vie des sociétés depuis que ses ...
La Cryptographie sur les Courbes Elliptiques (abréviée ECC de l'anglais Elliptic Curve Cryptography)...
This thesis, on the border between information security and cryptography, focuses on the use of info...
Embedded security applications are diverse and at the center of all personal embedded applications. ...
Les systèmes cryptographiques à base de courbes elliptiques sont aujourd'hui de plus en plus employé...
Ces travaux de thèse se concentrent sur l'étude des attaques par canaux cachés et les implications s...