Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected against them.Of course, malfunctioning protections are useless.Formal methods help to develop systems while assessing their conformity to a rigorous specification.The first goal of my thesis, and its innovative aspect, is to show that formal methods can be used to prove not only the principle of the countermeasures according to a model,but also their implementations, as it is where the physical vulnerabilities are exploited.My second goal is the proof and the automation of the protection techniques themselves, because handwritten security code is error-prone.Les implémentations cryptographiques sont vulnérables aux attaques physiques, et ont d...
Since the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun,...
This thesis explores two different approaches to reduce the size of the public key cryptosystems bas...
The fast growing complexity of hardware circuits, during the last three decades, has change devery s...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
Cryptography is taking an ever more important part in the life of societies since the users are real...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
Since the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun,...
This thesis explores two different approaches to reduce the size of the public key cryptosystems bas...
The fast growing complexity of hardware circuits, during the last three decades, has change devery s...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
Cryptography is taking an ever more important part in the life of societies since the users are real...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
Since the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun,...
This thesis explores two different approaches to reduce the size of the public key cryptosystems bas...
The fast growing complexity of hardware circuits, during the last three decades, has change devery s...