Cryptography is ubiquitous in today's interconnected world, protecting our communications, securing our payment systems. While the cryptographic algorithms are generally well understood, their implementations have been less subject to formal verification. This has lead to successful breakages of implementions of most modern primitives: AES, RSA, ECDSA... In general, cryptographic implementations would benefit from stronger theoretical guarantees.In this thesis, we apply this line of reasoning to two different topics, one in software security, and the other in hardware security. The first half of this thesis explores cache-timing side channel vulnerabilities that arise when the time taken by a cryptographic operation, or the cache state afte...
Performance has been and will continue to be a key criterion in the development of computer systems ...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
Public-key cryptography (PKC), widely used to protect communication in the Internet of Things (IoT),...
La cryptographie est omniprésente dans notre monde actuel hyperconnecté, protégeant nos communicatio...
Hardware-intrinsic security studies cryptographic methods, whose implementations are assisted by som...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
In recent years, PUF-based schemes have been suggested not only for the basic tasks of tamper-sensit...
This thesis studies efficiency and security problems of implementations of code-based cryptosystems....
Les attaques par canaux auxiliaires ont traditionnellement permis d’exploiter les vulnérabilités des...
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
During the last decade, constant-time cryptographic software has quickly transitioned from an academ...
Recently, the enormous cost of owning and maintaining a modern semiconductor manufacturing plant has...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
Performance has been and will continue to be a key criterion in the development of computer systems ...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
Public-key cryptography (PKC), widely used to protect communication in the Internet of Things (IoT),...
La cryptographie est omniprésente dans notre monde actuel hyperconnecté, protégeant nos communicatio...
Hardware-intrinsic security studies cryptographic methods, whose implementations are assisted by som...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
In recent years, PUF-based schemes have been suggested not only for the basic tasks of tamper-sensit...
This thesis studies efficiency and security problems of implementations of code-based cryptosystems....
Les attaques par canaux auxiliaires ont traditionnellement permis d’exploiter les vulnérabilités des...
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
During the last decade, constant-time cryptographic software has quickly transitioned from an academ...
Recently, the enormous cost of owning and maintaining a modern semiconductor manufacturing plant has...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
Performance has been and will continue to be a key criterion in the development of computer systems ...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
Public-key cryptography (PKC), widely used to protect communication in the Internet of Things (IoT),...