The goal of this thesis is to contribute to the state-of-the-art by proposing new areas of research in order to secure cryptographic algorithms within an embedded device.Our main focal axis is organized around the countermeasure called threshold implementations which is known to be resistant against side-channel analysis attacks in the presence of glitches.These latter phenomenon occur randomly within an electronic circuit and lead to numerous attacks in cryptanalysis. We study the application of threshold implementations on symmetric-key cryptography.In a first phase, we participate to the cryptographic litterature by designing new threshold implementations easily applicable on a large variety of symmetric-key algorithms. Our countermeasur...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
National audienceSecurity is a key component for information technologies and communication. Securit...
The security of modern embedded systems has been the subject of intensive research in engineering ar...
L’objectif de cette thèse est de proposer de nouvelles pistes de recherche dans l’état de l’art afin...
This thesis develops an overview of the so called Side Channel Attacks (SCA). In order to counter th...
© Springer-Verlag Berlin Heidelberg 2006. Implementations of cryptographic algorithms are vulnerable...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Abstract. Implementations of cryptographic algorithms are vulnerable to side-channel attacks. Maskin...
The subject of this thesis is the security analysis of cryptographic implementations. The need for s...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
A new approach to the security analysis of hardware-oriented masked ciphers against second-order sid...
Side channel attacks take advantage of the fact that the power consumption of a cryptographic device...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
National audienceSecurity is a key component for information technologies and communication. Securit...
The security of modern embedded systems has been the subject of intensive research in engineering ar...
L’objectif de cette thèse est de proposer de nouvelles pistes de recherche dans l’état de l’art afin...
This thesis develops an overview of the so called Side Channel Attacks (SCA). In order to counter th...
© Springer-Verlag Berlin Heidelberg 2006. Implementations of cryptographic algorithms are vulnerable...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Abstract. Implementations of cryptographic algorithms are vulnerable to side-channel attacks. Maskin...
The subject of this thesis is the security analysis of cryptographic implementations. The need for s...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
A new approach to the security analysis of hardware-oriented masked ciphers against second-order sid...
Side channel attacks take advantage of the fact that the power consumption of a cryptographic device...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
National audienceSecurity is a key component for information technologies and communication. Securit...
The security of modern embedded systems has been the subject of intensive research in engineering ar...