Cryptography and security market is growing up at a annual rate of 17% according to some recent studies. Cryptography is known to be the science of secret. It is based on mathematical hard problems as integer factorization, the well-known discrete logarithm problem. Although those problems are trusted, software or hardware implementations of cryptographic algorithms can suffer from inherent weaknesses. Execution time, power consumption (...) can differ depending on secret informations such as the secret key. Because of that, some malicious attacks could be used to exploit these weak points and therefore can be used to break the whole crypto-system. In this thesis, we are interested in protecting our physical device from the so called side c...
Current technologies have enabled knowledge to along pathways that go beyond pluralistic patterns of...
Guanine rich DNA strands have the ability to form four-stranded structures (G-quadruplexes). Their r...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
Cryptography and security market is growing up at an annual rate of 17 % according to some recent st...
Cryptography and security market is growing up at a annual rate of 17% according to some recent stud...
The main objective of this PhD thesis is to speedup elliptic curve cryptography (ECC) computations, ...
The emergence of embedded systems has enabled the development of wireless sensor networks indifferen...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
True Random Number Generators (TRNG) are ubiquitous in many critical cryptographic applications (key...
Part of the Large Hadron Collider (LHC) at CERN, the ALICE detector will be dedicated to the study o...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
Telecommunication systems today have increasing complexity and require higher energy consumption. Th...
210 pagesIn the first part of this work, the development of a particle sizing probe exploiting light...
Current technologies have enabled knowledge to along pathways that go beyond pluralistic patterns of...
Guanine rich DNA strands have the ability to form four-stranded structures (G-quadruplexes). Their r...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
Cryptography and security market is growing up at an annual rate of 17 % according to some recent st...
Cryptography and security market is growing up at a annual rate of 17% according to some recent stud...
The main objective of this PhD thesis is to speedup elliptic curve cryptography (ECC) computations, ...
The emergence of embedded systems has enabled the development of wireless sensor networks indifferen...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
True Random Number Generators (TRNG) are ubiquitous in many critical cryptographic applications (key...
Part of the Large Hadron Collider (LHC) at CERN, the ALICE detector will be dedicated to the study o...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
Telecommunication systems today have increasing complexity and require higher energy consumption. Th...
210 pagesIn the first part of this work, the development of a particle sizing probe exploiting light...
Current technologies have enabled knowledge to along pathways that go beyond pluralistic patterns of...
Guanine rich DNA strands have the ability to form four-stranded structures (G-quadruplexes). Their r...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...