This thesis develops an overview of the so called Side Channel Attacks (SCA). In order to counter these attacks against implementations, it is proposed solutions at three different levels : the hardware level, the mathematic level and the algorithmic level. The state of the art of SCA provided in the second chapter, underlines clearly that the side channels provide multiple attack paths to attackers. At the hardware level, the results obtained in the European project ESPASS-IS have led to the definition of new and innovative projets between the TIMA Laboratory, the LIRMM and STMicroelectronics. At the mathematical level, the definition of a Leak Resistant Arithmetic (LRA), in collaboration with the LIRMM, was the starting point of a several...
Les attaques par canaux auxiliaires telles que l'analyse différentielle de la consommation de couran...
L’ère numérique d’aujourd’hui relie tous les objets entre eux grâce à l’Internet des objets (IoT). C...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
Information security heavily relies on integrated circuits (ICs). Unfortunately, ICs face a lot of t...
The subject of this thesis is the security analysis of cryptographic implementations. The need for s...
In the field of the security of the embeded systems, it is necessary to know and understandthe possi...
The security of modern embedded systems has been the subject of intensive research in engineering ar...
National audienceSecurity is a key component for information technologies and communication. Securit...
The goal of this thesis is to contribute to the state-of-the-art by proposing new areas of research ...
Depuis les années 90, les attaques par canaux auxiliaires ont remis en cause le niveau de sécurité d...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Les attaques par canaux cachés telles que les attaques par analyse de la consommation sont une menac...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Les cryptosystèmes sont présents dans de nombreux appareils utilisés dans la vie courante, tels que ...
Les attaques par canaux auxiliaires telles que l'analyse différentielle de la consommation de couran...
L’ère numérique d’aujourd’hui relie tous les objets entre eux grâce à l’Internet des objets (IoT). C...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
Information security heavily relies on integrated circuits (ICs). Unfortunately, ICs face a lot of t...
The subject of this thesis is the security analysis of cryptographic implementations. The need for s...
In the field of the security of the embeded systems, it is necessary to know and understandthe possi...
The security of modern embedded systems has been the subject of intensive research in engineering ar...
National audienceSecurity is a key component for information technologies and communication. Securit...
The goal of this thesis is to contribute to the state-of-the-art by proposing new areas of research ...
Depuis les années 90, les attaques par canaux auxiliaires ont remis en cause le niveau de sécurité d...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Les attaques par canaux cachés telles que les attaques par analyse de la consommation sont une menac...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Les cryptosystèmes sont présents dans de nombreux appareils utilisés dans la vie courante, tels que ...
Les attaques par canaux auxiliaires telles que l'analyse différentielle de la consommation de couran...
L’ère numérique d’aujourd’hui relie tous les objets entre eux grâce à l’Internet des objets (IoT). C...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...