Ferroelectric RAM (FRAM) is a promising non-volatile memory technology that is now available in low-end microcontrollers. Its main advantages over Flash memories are faster write performances and much larger tolerated number of write/erase cycles. These properties are profitable for the efficient implementation of side-channel countermeasures exploiting pre-computations. In this paper, we illustrate the interest of FRAM-based microcontrollers for physically secure cryptographic hardware with two case studies. First we consider a recent shuffling scheme for the AES algorithm, exploiting randomized program memories. We exhibit significant performance gains over previous results in an Atmel microcontroller, thanks to the fine-grained programma...
Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers...
Abstract. We propose a new countermeasure to protect block ciphers implemented in leaking devices, a...
The vast diffusion of microcontrollers has led to their employment in security sensitive contexts, w...
Abstract. Block Memory Content Scrambling (BMS), presented at CHES 2011, enables an effective way of...
Emerging Non-Volatile Memories (NVMs) such as Magnetic RAM (MRAM), Spin-Transfer Torque RAM (STTRAM)...
Several promising non-volatile memories (NVMs) such as magnetic RAM (MRAM), spin-transfer torque RAM...
International audienceIn this paper, we present a lightweight secured AES hardware implementation de...
Abstract. By shrinking the technology and reducing the energy require-ments of integrated circuits, ...
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into sever...
International audienceToday's trend in the smart card industry is to move from ROM+EEPROM chips to F...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
This research is the first of its kind to investigate the utilisation of a multi-threading software-...
We demonstrate that unmodified commercial Flash memory can provide three important security function...
Being based on a sound theoretical basis, masking schemes are commonly applied to protect cryptograp...
This paper presents a new proposal for hiding the cryptographic key, when the so-called side-channel...
Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers...
Abstract. We propose a new countermeasure to protect block ciphers implemented in leaking devices, a...
The vast diffusion of microcontrollers has led to their employment in security sensitive contexts, w...
Abstract. Block Memory Content Scrambling (BMS), presented at CHES 2011, enables an effective way of...
Emerging Non-Volatile Memories (NVMs) such as Magnetic RAM (MRAM), Spin-Transfer Torque RAM (STTRAM)...
Several promising non-volatile memories (NVMs) such as magnetic RAM (MRAM), spin-transfer torque RAM...
International audienceIn this paper, we present a lightweight secured AES hardware implementation de...
Abstract. By shrinking the technology and reducing the energy require-ments of integrated circuits, ...
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into sever...
International audienceToday's trend in the smart card industry is to move from ROM+EEPROM chips to F...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
This research is the first of its kind to investigate the utilisation of a multi-threading software-...
We demonstrate that unmodified commercial Flash memory can provide three important security function...
Being based on a sound theoretical basis, masking schemes are commonly applied to protect cryptograp...
This paper presents a new proposal for hiding the cryptographic key, when the so-called side-channel...
Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers...
Abstract. We propose a new countermeasure to protect block ciphers implemented in leaking devices, a...
The vast diffusion of microcontrollers has led to their employment in security sensitive contexts, w...