With the rise of the Internet of Things and the growing popularity of constrained devices, several security protocols are widely deployed. In this thesis, we investigate the field of authenticated key exchange protocols in the symmetric-key setting. We show that existing protocols do not achieve the most established levels of security properties, and describe practical attacks against two currently deployed protocols. We present new authenticated key exchange protocols for the 2-party and the 3-party cases, and describe suitable security models that allow capturing their security goals, and analysing them. Our protocols apply only symmetric-key functions. At the same time, they provide stronger security properties than comparable ones. ln p...
The power supply current of a smart card exhibits significant correlations with the data processed b...
From a technical point of view, the Internet is a distributed system of computers. As such, traditio...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Our society extensively relies on communications systems. Because such systems are used to exchange ...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
This thesis is about symmetric, or private key, cryptography. It has a focus on modes of operation a...
The ever growing number and complexity of concerns in software intensive systems (e.g., safety, HMI,...
Even if a cryptographic algortihm could be mathematically secure, its physical implementation could ...
Managing the vast quantities of data generated in the context of information system security becomes...
Architectures of cryptographic processors and coprocessors are often vulnerable to different kinds o...
The power supply current of a smart card exhibits significant correlations with the data processed b...
From a technical point of view, the Internet is a distributed system of computers. As such, traditio...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Our society extensively relies on communications systems. Because such systems are used to exchange ...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
This thesis is about symmetric, or private key, cryptography. It has a focus on modes of operation a...
The ever growing number and complexity of concerns in software intensive systems (e.g., safety, HMI,...
Even if a cryptographic algortihm could be mathematically secure, its physical implementation could ...
Managing the vast quantities of data generated in the context of information system security becomes...
Architectures of cryptographic processors and coprocessors are often vulnerable to different kinds o...
The power supply current of a smart card exhibits significant correlations with the data processed b...
From a technical point of view, the Internet is a distributed system of computers. As such, traditio...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...