The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the variation of device emanations to retrieve a secret key. These emanations can be the power consumption, the electromagnetic radiation, etc. Most of the time, those attacks use statistical methods to examine the relationship between the emanations and some leakage models supposed by the attacker. Three main axis are developed here. First, we have implemented many side channel attacks on GPGPU using the API OpenCL. These implementations are more effective than the classical ones, so an attacker can exploit more data. Then, in order to provide a new side channel attack, we have suggested the use of a new dependency measurement proposed by Reshef et a...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
The power supply current of a smart card exhibits significant correlations with the data processed b...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Cryptography and security market is growing up at an annual rate of 17 % according to some recent st...
Cryptography and security market is growing up at a annual rate of 17% according to some recent stud...
Cryptography is taking an ever more important part in the life of societies since the users are real...
The main subject of this work is the physical cryptanalysis of blocks ciphers. Even if cryptographic...
Since the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun,...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
The power supply current of a smart card exhibits significant correlations with the data processed b...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Cryptography and security market is growing up at an annual rate of 17 % according to some recent st...
Cryptography and security market is growing up at a annual rate of 17% according to some recent stud...
Cryptography is taking an ever more important part in the life of societies since the users are real...
The main subject of this work is the physical cryptanalysis of blocks ciphers. Even if cryptographic...
Since the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun,...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
The power supply current of a smart card exhibits significant correlations with the data processed b...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...