In this thesis, we are interested in the security of pseudorandom number generators and of implementations of signature schemes. Regarding the signature schemes, we propose, in the case of a widespread implementation of RSA, various fault attacks which apply to any padding function. In addition we present a proven secure infective countermeasure to protect the RSA--PSS scheme against some non-random faults. Furthermore we study the ECDSA scheme coupled with the GLV/GLS speed-up techniques. Depending on the implementations, we prove either the good distribution of the used nonce, or that it has a bias, thereby enabling an attack. Finally we develop a tool for automatically finding fault attacks given an implementation and a fault policy, whi...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensive...
The DSS signature algorithm requires the signer to generate a new random number with every signature...
In this paper, we present several efficient fault attacks against implementations of RSA-CRT signatu...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
In cryptography, randomness plays an important role in multiple applications. It is required in fund...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
Randomness is a key ingredient in cryptography. For instance, random numbers are used to generate ke...
Abstract. RSA–CRT is the most widely used implementation for RSA signatures. However, determin-istic...
International audienceRSA–CRT is the most widely used implementation for RSA signatures. However, de...
Abstract. In this paper, we study the security of the Micali-Schnorr pseudorandom number generator. ...
Abstract. Fault attacks exploit hardware malfunctions or induce them to recover secret keys embedded...
International audienceIn this paper, we study the security of the Micali-Schnorr pseudorandom number...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensive...
The DSS signature algorithm requires the signer to generate a new random number with every signature...
In this paper, we present several efficient fault attacks against implementations of RSA-CRT signatu...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
In cryptography, randomness plays an important role in multiple applications. It is required in fund...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
Randomness is a key ingredient in cryptography. For instance, random numbers are used to generate ke...
Abstract. RSA–CRT is the most widely used implementation for RSA signatures. However, determin-istic...
International audienceRSA–CRT is the most widely used implementation for RSA signatures. However, de...
Abstract. In this paper, we study the security of the Micali-Schnorr pseudorandom number generator. ...
Abstract. Fault attacks exploit hardware malfunctions or induce them to recover secret keys embedded...
International audienceIn this paper, we study the security of the Micali-Schnorr pseudorandom number...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensive...
The DSS signature algorithm requires the signer to generate a new random number with every signature...
In this paper, we present several efficient fault attacks against implementations of RSA-CRT signatu...