Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black-box attacks only exploit the inputs and outputs of cryptographic algorithms, side-channel attacks also use the physical leakage released by the underlying device during algorithms executions. In this thesis, we focus on one kind of side-channel attacks which exploits the power consumption of the underlying device to recover the algorithms secret keys : power-analysis attacks.Most of the existing power-analysis attacks rely on the observations of variables which only depend on a few secret bits using a divide-and-conquer strategy. In this thesis, we exhibit new kinds of attacks which exploit the observation of intermediate variables highly de...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Since the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun,...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weakness...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Cryptography is taking an ever more important part in the life of societies since the users are real...
This thesis is about symmetric, or private key, cryptography. It has a focus on modes of operation a...
En cryptographie moderne, un système de chiffrement est traditionnellement étudié dans le modèle dit...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Since the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun,...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weakness...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Cryptography is taking an ever more important part in the life of societies since the users are real...
This thesis is about symmetric, or private key, cryptography. It has a focus on modes of operation a...
En cryptographie moderne, un système de chiffrement est traditionnellement étudié dans le modèle dit...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...