International audienceWith the Internet of Things (IoT) an increasing amount of sensitive data have to be communicated and hence encrypted. Low-cost hardware attacks such as fault analysis (FA) or side-channel analysis (SCA) threaten the implementation of cryptographic algorithms. Many countermeasures have been proposed against either of these attacks, however, only a few countermeasures protect efficiently an implementation against both attacks. These combined countermeasures usually have a prohibitive area and power overhead, and require up to thousands of bits of fresh randomness at each encryption. Therefore, they may not be suited to protect lightweight algorithms in resource-constrained devices. In this paper, we propose a new combine...
Security in Internet of Things (IoT) applications is more important than ever. New devices are pushe...
As we are close to the advent of quantum computing capability, the potential use of resistant algori...
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
International audienceWith the Internet of Things (IoT) an increasing amount of sensitive data have ...
International audienceWith the Internet of Things, an increasing amount of sensitive data have to be...
Power analysis presents the typical example of successful attacks against trusted cryptographic devi...
The internet of things (IoT) revolution has been sparked by the exponential increase in connected de...
With the explosion in the number of internet of things (IoT) devices in recent years, the security o...
Dynamically reconfigurable systems are known to have many advantages such as area and power reductio...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
International audienceSecurity attacks against Internet of Things (IoT) are on the rise and they lea...
Abstract. Dynamically reconfigurable systems are known to have many advantages such as area and powe...
With the emergence of the internet of things, the research surrounding the design of cryptographic a...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
Security in Internet of Things (IoT) applications is more important than ever. New devices are pushe...
As we are close to the advent of quantum computing capability, the potential use of resistant algori...
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
International audienceWith the Internet of Things (IoT) an increasing amount of sensitive data have ...
International audienceWith the Internet of Things, an increasing amount of sensitive data have to be...
Power analysis presents the typical example of successful attacks against trusted cryptographic devi...
The internet of things (IoT) revolution has been sparked by the exponential increase in connected de...
With the explosion in the number of internet of things (IoT) devices in recent years, the security o...
Dynamically reconfigurable systems are known to have many advantages such as area and power reductio...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
International audienceSecurity attacks against Internet of Things (IoT) are on the rise and they lea...
Abstract. Dynamically reconfigurable systems are known to have many advantages such as area and powe...
With the emergence of the internet of things, the research surrounding the design of cryptographic a...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
Security in Internet of Things (IoT) applications is more important than ever. New devices are pushe...
As we are close to the advent of quantum computing capability, the potential use of resistant algori...
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...