Today mobile devices are an integral part of our lives with the development of applications. In addition to smart phones, which are increasingly powerful, other devices such as connected objects may have to handle data that must remain secret. For example, the authentication of a connected object in a network requires the existence of a ``secret" held by the object. In the case of mobile applications, the emergence of payment applications allowing contactless payment from the telephone or banking applications poses serious security challenges. The need to secure applications is therefore essential both for users wishing to access a service without risking their goods and for service providers who have a financial interest in it. Thus, crypt...
For modern cryptography, the security of a system is defined as the sum of the resources required to...
The research work practiced in this PhD program is dedicated to investigating the use of machine lea...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
Today mobile devices are an integral part of our lives with the development of applications. In addi...
Aujourd'hui les équipements mobiles font partie intégrante de nos vies avec le développement des app...
Cryptography studies how to secure communications and information. The security of a cryptosystem de...
The demand for internet of Things (IoT) services is increasing exponentially, and a large number of ...
The information society we belong to heavily relies on secure information exchanges. To exchange inf...
The last decade has seen the massive democratization of smart devices such as phones, tablets, even ...
La stéganographie numérique est une technique récente qui a émergé comme une source importante pour ...
Architectures of cryptographic processors and coprocessors are often vulnerable to different kinds o...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
The rapid expansion of the IoT has unleashed a tidal wave of cheap Internet-connected hardware. Form...
Communication systems need to access, store, manipulate, or communicate sensitive information. There...
The new decentralized computing paradigm introduced by Machine-to-Machine (M2M) communications and t...
For modern cryptography, the security of a system is defined as the sum of the resources required to...
The research work practiced in this PhD program is dedicated to investigating the use of machine lea...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
Today mobile devices are an integral part of our lives with the development of applications. In addi...
Aujourd'hui les équipements mobiles font partie intégrante de nos vies avec le développement des app...
Cryptography studies how to secure communications and information. The security of a cryptosystem de...
The demand for internet of Things (IoT) services is increasing exponentially, and a large number of ...
The information society we belong to heavily relies on secure information exchanges. To exchange inf...
The last decade has seen the massive democratization of smart devices such as phones, tablets, even ...
La stéganographie numérique est une technique récente qui a émergé comme une source importante pour ...
Architectures of cryptographic processors and coprocessors are often vulnerable to different kinds o...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
The rapid expansion of the IoT has unleashed a tidal wave of cheap Internet-connected hardware. Form...
Communication systems need to access, store, manipulate, or communicate sensitive information. There...
The new decentralized computing paradigm introduced by Machine-to-Machine (M2M) communications and t...
For modern cryptography, the security of a system is defined as the sum of the resources required to...
The research work practiced in this PhD program is dedicated to investigating the use of machine lea...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...