Architectures of cryptographic processors and coprocessors are often vulnerable to different kinds of attacks, especially those targeting the disclosure of encryption keys. It is well known that manipulating confidential keys by the processor as ordinary data can represent a threat: a change in the program code (malicious or unintentional) can cause the unencrypted confidential key to leave the security area. This way, the security of the whole system would be irrecoverably compromised. The aim of our work was to search for flexible and reconfigurable hardware architectures, which can provide high security of confidential keys during their generation, storage and exchange while implementing common symmetric key cryptographic modes and proto...
Avec l’utilisation massive du stockage dématérialisé, l’homomorphisme est devenu l’une des propriété...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
Communication systems need to access, store, manipulate, or communicate sensitive information. There...
Les architectures des processeurs et coprocesseurs cryptographiques se montrent fréquemment vulnérab...
Today mobile devices are an integral part of our lives with the development of applications. In addi...
Cryptographic protocols are one of the foundations for the trust people put in computer systems nowa...
Cryptography studies how to secure communications and information. The security of a cryptosystem de...
The information society we belong to heavily relies on secure information exchanges. To exchange inf...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Contrairement aux protocoles cryptographiques fondés sur la théorie des nombres, les systèmes de chi...
Le sujet de cette thèse est l'analyse de sécurité des implantations cryptographiques embarquées.La s...
With the rise of the Internet the use of cryptographic protocols became ubiquitous. Considering the ...
Aujourd'hui les équipements mobiles font partie intégrante de nos vies avec le développement des app...
L'isolation des processus est la contrainte de sécurité la plus importante imposée par les systèmes ...
Avec l’utilisation massive du stockage dématérialisé, l’homomorphisme est devenu l’une des propriété...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
Communication systems need to access, store, manipulate, or communicate sensitive information. There...
Les architectures des processeurs et coprocesseurs cryptographiques se montrent fréquemment vulnérab...
Today mobile devices are an integral part of our lives with the development of applications. In addi...
Cryptographic protocols are one of the foundations for the trust people put in computer systems nowa...
Cryptography studies how to secure communications and information. The security of a cryptosystem de...
The information society we belong to heavily relies on secure information exchanges. To exchange inf...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Contrairement aux protocoles cryptographiques fondés sur la théorie des nombres, les systèmes de chi...
Le sujet de cette thèse est l'analyse de sécurité des implantations cryptographiques embarquées.La s...
With the rise of the Internet the use of cryptographic protocols became ubiquitous. Considering the ...
Aujourd'hui les équipements mobiles font partie intégrante de nos vies avec le développement des app...
L'isolation des processus est la contrainte de sécurité la plus importante imposée par les systèmes ...
Avec l’utilisation massive du stockage dématérialisé, l’homomorphisme est devenu l’une des propriété...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
Communication systems need to access, store, manipulate, or communicate sensitive information. There...