Programs commonly perform computations involving secret data, relying on cryptographic code to guarantee their confidentiality. In this context, it is crucial to ensure that cryptographic code cannot be exploited by an attacker to leak secret data. Unfortunately, even if cryptogtaphic algorithms are based upon secure mathematical foundations, their execution in the physical world can produce side-effects that can be exploited to recover secrets. In particular, an attacker can exploit the execution time of a program to leak secret data, or use timing to recover secrets encoded in the microarchitecture using microarchitectural timing attacks. More recently, Spectre attacks showed that it is also possible to exploit processor optimizations—in ...
With the rise of the Internet the use of cryptographic protocols became ubiquitous. Considering the ...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Cryptography is ubiquitous in today's interconnected world, protecting our communications, securing ...
Programs commonly perform computations involving secret data, relying on cryptographic code to guara...
Les logiciels informatiques manipulent fréquemment des données secrètes, garantissant généralement l...
This paper tackles the problem of designing efficient binary-level verification for a subset of info...
This thesis studies the analysis of cryptographic protocols. They are sequences of instructions perm...
La cryptographie est omniprésente dans notre monde actuel hyperconnecté, protégeant nos communicatio...
The topic of this dissertation is Cryptography, and its connections with Coding Theory. Concretely, ...
International audienceThis paper tackles the problem of designing efficient binary-level verificatio...
Le sujet de cette thèse est la cryptographie et son interconnexions avec la théorie des codes. En pa...
International audienceThis paper tackles the problem of designing efficient binary-level verificatio...
Le sujet de cette thèse est l'analyse de sécurité des implantations cryptographiques embarquées.La s...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
International audienceSpectre are microarchitectural attacks which were made public in January 2018....
With the rise of the Internet the use of cryptographic protocols became ubiquitous. Considering the ...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Cryptography is ubiquitous in today's interconnected world, protecting our communications, securing ...
Programs commonly perform computations involving secret data, relying on cryptographic code to guara...
Les logiciels informatiques manipulent fréquemment des données secrètes, garantissant généralement l...
This paper tackles the problem of designing efficient binary-level verification for a subset of info...
This thesis studies the analysis of cryptographic protocols. They are sequences of instructions perm...
La cryptographie est omniprésente dans notre monde actuel hyperconnecté, protégeant nos communicatio...
The topic of this dissertation is Cryptography, and its connections with Coding Theory. Concretely, ...
International audienceThis paper tackles the problem of designing efficient binary-level verificatio...
Le sujet de cette thèse est la cryptographie et son interconnexions avec la théorie des codes. En pa...
International audienceThis paper tackles the problem of designing efficient binary-level verificatio...
Le sujet de cette thèse est l'analyse de sécurité des implantations cryptographiques embarquées.La s...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
International audienceSpectre are microarchitectural attacks which were made public in January 2018....
With the rise of the Internet the use of cryptographic protocols became ubiquitous. Considering the ...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Cryptography is ubiquitous in today's interconnected world, protecting our communications, securing ...