Communication systems need to access, store, manipulate, or communicate sensitive information. Therefore, cryptographic primitives such as hash functions and block ciphers are deployed to provide encryption and authentication. Recently, techniques have been invented to combine encryption and authentication into a single algorithm which is called Authenticated Encryption (AE). Combining these two security services in hardware produces better performance compared to two separated algorithms since authentication and encryption can share a part of the computation. Because of combining the programmability with the performance ofcustom hardware, FPGAs become more common as an implementation target for such algorithms. The first part of this thesi...
The Internet of Things (IoT) has been fostered by accelerated advancements in communication technolo...
La stéganographie numérique est une technique récente qui a émergé comme une source importante pour ...
For modern cryptography, the security of a system is defined as the sum of the resources required to...
International audienceLa tendance du marché des produits sécurisés est d'offrir plus d'avantage de s...
Aujourd'hui les équipements mobiles font partie intégrante de nos vies avec le développement des app...
Security is a crucial requirement in the applications based on information and communication technol...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
Modern cryptography relies on the notion of computational security. The level of security given by a...
Les architectures des processeurs et coprocesseurs cryptographiques se montrent fréquemment vulnérab...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
Motivée par le commerce et l'industrie, la recherche publique dans le domaine du chiffrement symétri...
Security is a major stake of modern numerical technologies. With the development of the Internet, th...
The Internet of Things (IoT) has been fostered by accelerated advancements in communication technolo...
La stéganographie numérique est une technique récente qui a émergé comme une source importante pour ...
For modern cryptography, the security of a system is defined as the sum of the resources required to...
International audienceLa tendance du marché des produits sécurisés est d'offrir plus d'avantage de s...
Aujourd'hui les équipements mobiles font partie intégrante de nos vies avec le développement des app...
Security is a crucial requirement in the applications based on information and communication technol...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
Modern cryptography relies on the notion of computational security. The level of security given by a...
Les architectures des processeurs et coprocesseurs cryptographiques se montrent fréquemment vulnérab...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
Motivée par le commerce et l'industrie, la recherche publique dans le domaine du chiffrement symétri...
Security is a major stake of modern numerical technologies. With the development of the Internet, th...
The Internet of Things (IoT) has been fostered by accelerated advancements in communication technolo...
La stéganographie numérique est une technique récente qui a émergé comme une source importante pour ...
For modern cryptography, the security of a system is defined as the sum of the resources required to...