International audienceIn embedded systems, the presence of a security layer is now a well-established requirement. In order to guarantee the suitable level of performance and resistance against attacks, dedicated hardware implementations are often proposed to accelerate cryptographic computations in a controllable environment. On the other hand, these same implementations may be vulnerable to physical attacks, such as side channel analysis or fault injections. In this scenario, the designer must hence be able to assess the robustness of the implementation (and of the adopted countermeasures) as soon as possible in the design flow against several different threats. In this paper, we propose a methodology to characterize the robustness of a g...
SRAM-Filed Programmable Gate Arrays (FPGA) have become one of the most important carriers of digital...
Security is acknowledged as one of the main challenges in the design and deployment of embedded circ...
ISBN 978-1-61208-149-6International audienceApplications increasingly rely on secure embedded system...
International audienceIn embedded systems, the presence of a security layer is now a well-establishe...
In this contribution, we present an FPGA-based simulation environment for fault attacks on cryptogra...
International audienceImplementation attacks are a major threat to hardware cryptographic implementa...
International audienceImplementation attacks are a major threat to hardware cryptographic implementa...
Steadily decreasing transistor sizes and new multi beam laser attacks lead to an increasing amount o...
Steadily decreasing transistor sizes and new multi beam laser attacks lead to an increasing amount o...
Faults attacks are a serious threat to secure devices, because they are powerful and they can be per...
Security is acknowledged as one of the main challenges in the design and deployment of embedded circ...
ISBN 978-1-4244-6965-9International audienceLaser-based fault injections are currently the most effi...
Abstract. We present a unified framework for advanced implementa-tion attacks that allows for conduc...
Setup time variation fault attacks that aim straightly at the FPGA devices have become hot spots now...
With the wide application of FPGA in communication industry, the security of deployed hardware has b...
SRAM-Filed Programmable Gate Arrays (FPGA) have become one of the most important carriers of digital...
Security is acknowledged as one of the main challenges in the design and deployment of embedded circ...
ISBN 978-1-61208-149-6International audienceApplications increasingly rely on secure embedded system...
International audienceIn embedded systems, the presence of a security layer is now a well-establishe...
In this contribution, we present an FPGA-based simulation environment for fault attacks on cryptogra...
International audienceImplementation attacks are a major threat to hardware cryptographic implementa...
International audienceImplementation attacks are a major threat to hardware cryptographic implementa...
Steadily decreasing transistor sizes and new multi beam laser attacks lead to an increasing amount o...
Steadily decreasing transistor sizes and new multi beam laser attacks lead to an increasing amount o...
Faults attacks are a serious threat to secure devices, because they are powerful and they can be per...
Security is acknowledged as one of the main challenges in the design and deployment of embedded circ...
ISBN 978-1-4244-6965-9International audienceLaser-based fault injections are currently the most effi...
Abstract. We present a unified framework for advanced implementa-tion attacks that allows for conduc...
Setup time variation fault attacks that aim straightly at the FPGA devices have become hot spots now...
With the wide application of FPGA in communication industry, the security of deployed hardware has b...
SRAM-Filed Programmable Gate Arrays (FPGA) have become one of the most important carriers of digital...
Security is acknowledged as one of the main challenges in the design and deployment of embedded circ...
ISBN 978-1-61208-149-6International audienceApplications increasingly rely on secure embedded system...