Nowadays, embedded systems and smart cards are part of everyday life. With the proliferation of these devices the need for security increases. In order to meet this demand, cryptographic algorithms are applied. However, even if the algorithms on mobile devices are secure from a cryptanalytical point of view, the secret they use can be revealed by attacking the cryptographic implementation. Indeed an adversary with physical access to the device can benefit from its characteristics or influence its behavior. Methods that observe the activity of a device are considered as passive attacks. In contrast, active attacks try to manipulate the computation and benefit from the erroneous results. These last methods are also called fault injection atta...
Since the democratization of mobile devices, sensitive operations likepayment, identification or hea...
ISBN : 978-3-540-46250-7International audienceThis paper proposes a practical fault attack on two as...
International audienceImplementations of cryptographic algorithms continue to proliferate in consume...
Dans cette thèse, Nous présentons différents aspects d'attaques physiques sur les implémentations cr...
New hardware cryptanalysis methods such as fault-based attacks have shown their efficiency to break ...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
ISBN : 978-2-84813-136-8Security of digital processing is important in our society. Many application...
International audienceProgrammable devices are an interesting alternative when implementing embedded...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
ISBN 978-1-4244-6965-9International audienceLaser-based fault injections are currently the most effi...
The cryptographic blocks used in the integrated circuits implement algorithms proved robust against ...
Les blocs cryptographiques utilisés dans les circuits intégrés implémentent des algorithmes prouvés ...
Microelectronic security devices are more and more present in our lives (smartcards, SIM cards) and ...
Les circuits cryptographiques, parce qu'ils contiennent des informations confidentielles, font l'obj...
ISBN 978-1-4244-5833-2International audienceProgrammable devices like SRAM-based FPGAs, thanks to th...
Since the democratization of mobile devices, sensitive operations likepayment, identification or hea...
ISBN : 978-3-540-46250-7International audienceThis paper proposes a practical fault attack on two as...
International audienceImplementations of cryptographic algorithms continue to proliferate in consume...
Dans cette thèse, Nous présentons différents aspects d'attaques physiques sur les implémentations cr...
New hardware cryptanalysis methods such as fault-based attacks have shown their efficiency to break ...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
ISBN : 978-2-84813-136-8Security of digital processing is important in our society. Many application...
International audienceProgrammable devices are an interesting alternative when implementing embedded...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
ISBN 978-1-4244-6965-9International audienceLaser-based fault injections are currently the most effi...
The cryptographic blocks used in the integrated circuits implement algorithms proved robust against ...
Les blocs cryptographiques utilisés dans les circuits intégrés implémentent des algorithmes prouvés ...
Microelectronic security devices are more and more present in our lives (smartcards, SIM cards) and ...
Les circuits cryptographiques, parce qu'ils contiennent des informations confidentielles, font l'obj...
ISBN 978-1-4244-5833-2International audienceProgrammable devices like SRAM-based FPGAs, thanks to th...
Since the democratization of mobile devices, sensitive operations likepayment, identification or hea...
ISBN : 978-3-540-46250-7International audienceThis paper proposes a practical fault attack on two as...
International audienceImplementations of cryptographic algorithms continue to proliferate in consume...