In this thesis, we are interested in the security of pseudorandom number generators and of implementations of signature schemes. Regarding the signature schemes, we propose, in the case of a widespread implementation of RSA, various fault attacks which apply to any padding function. In addition we present a proven secure infective countermeasure to protect the RSA--PSS scheme against some non-random faults. Furthermore we study the ECDSA scheme coupled with the GLV/GLS speed-up techniques. Depending on the implementations, we prove either the good distribution of the used nonce, or that it has a bias, thereby enabling an attack. Finally we develop a tool for automatically finding fault attacks given an implementation and a fault policy, whi...
Road traffic is at the heart of concerns for society due to issues of spatial development, mobility,...
Nowadays, more and more calculations, including monitoring and control, are done by software. Our go...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Cryptography and security market is growing up at a annual rate of 17% according to some recent stud...
Cryptography and security market is growing up at an annual rate of 17 % according to some recent st...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
The main objective of this PhD thesis is to speedup elliptic curve cryptography (ECC) computations, ...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
Version définitive de la thèse (dépôt Université)Intrusion detection aims to automate the detection ...
Objects based systems are presents everywhere in our life. When such a system presents vulnerabiliti...
The power supply current of a smart card exhibits significant correlations with the data processed b...
In this thesis, we consider the question of the ambiguity of queries submitted to a search engine in...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
Road traffic is at the heart of concerns for society due to issues of spatial development, mobility,...
Nowadays, more and more calculations, including monitoring and control, are done by software. Our go...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Cryptography and security market is growing up at a annual rate of 17% according to some recent stud...
Cryptography and security market is growing up at an annual rate of 17 % according to some recent st...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
The main objective of this PhD thesis is to speedup elliptic curve cryptography (ECC) computations, ...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
Version définitive de la thèse (dépôt Université)Intrusion detection aims to automate the detection ...
Objects based systems are presents everywhere in our life. When such a system presents vulnerabiliti...
The power supply current of a smart card exhibits significant correlations with the data processed b...
In this thesis, we consider the question of the ambiguity of queries submitted to a search engine in...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
Road traffic is at the heart of concerns for society due to issues of spatial development, mobility,...
Nowadays, more and more calculations, including monitoring and control, are done by software. Our go...
Security protocols are programs that secure communications by defining exchange rules on a network. ...