Modern cryptography relies on the Kerckhoff’s principle which states that everything about a crypto-system should be public, except for the secret keys. In this thesis, I apply these principles to cryptography implementations by providing the evaluator full knowledge of the implementation, in a worst-case manner. As a result, it allows to estimate their long-term security against side-channel attacks. The first part is dedicated to the verification of the two underlying assumptions in masking proofs. More precisely, I contribute to proof-based evaluations by putting forward that i) the verification of independence thanks to leakage detection benefits from multivariate statistics ii) the noise can be estimated in a quantitative manner thanks...
Abstract. A general method to secure cryptographic algorithm implementations against side-channel at...
International audienceThis article revisits side-channel analysis from the standpoint of coding theo...
© Springer-Verlag Berlin Heidelberg 2006. Implementations of cryptographic algorithms are vulnerable...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
Side-channel adversaries represent real-world threats against (certified and uncertified) cryptograp...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
We take advantage of a recently published open source implementation of the AES protected with a mix...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Since 1996, numerous attacks have been shown to uncover secrets by exploiting a device's physical be...
International audienceA common countermeasure against side-channel attacks consists in using the mas...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Abstract. A general method to secure cryptographic algorithm implementations against side-channel at...
International audienceThis article revisits side-channel analysis from the standpoint of coding theo...
© Springer-Verlag Berlin Heidelberg 2006. Implementations of cryptographic algorithms are vulnerable...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
Side-channel adversaries represent real-world threats against (certified and uncertified) cryptograp...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
We take advantage of a recently published open source implementation of the AES protected with a mix...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Since 1996, numerous attacks have been shown to uncover secrets by exploiting a device's physical be...
International audienceA common countermeasure against side-channel attacks consists in using the mas...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Abstract. A general method to secure cryptographic algorithm implementations against side-channel at...
International audienceThis article revisits side-channel analysis from the standpoint of coding theo...
© Springer-Verlag Berlin Heidelberg 2006. Implementations of cryptographic algorithms are vulnerable...