International audienceThe security of a lot of applications relies nowadays on cryptographic primitives implemented in hardware. Various types of attacks are known on such systems, one of the most recent being based on the injection of faults directly inside the circuits, for example using a laser. Such fault-attacks can allow a hacker to observe abnormal behaviors, from which secret data can be inferred. Due to these threats, it becomes necessary to analyze very early, during the circuit design, the potential impact of faults in order to implement protections that avoid security flaws, while keeping the overheads to a minimum. Dependability analysis environments have been developed to analyze the effect of "natural" faults, for example tho...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
ISBN 978-1-4244-6965-9International audienceLaser-based fault injections are currently the most effi...
Implementations of cryptographic algorithms continue to proliferate in consumer products due to the ...
International audienceSecurity often relies on functions implemented in hardware. But various types ...
International audienceThe secret keys handled by cryptographic devices can be extracted using fault ...
In this contribution, we present an FPGA-based simulation environment for fault attacks on cryptogra...
This research provides a set of methods, tools and design guidelines that help a designer to constr...
Hardware designers invest a significant design effort when implementing computationally intensive cr...
The effect of faults on electronic systems has been studied since the 1970s when it was noticed that...
ISBN : 978-2-84813-124-5International audienceThis paper summarizes the main types of attacks that c...
Faults attacks are a serious threat to secure devices, because they are powerful and they can be per...
Abstract—For a secure hardware designer, the vast array of fault attacks and countermeasures looks l...
This book constitutes the refereed proceedings of the Third International Workshop on Fault Diagnosi...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
The thesis deals with attacks that cause faults in CPU and MCU calculations. A short voltage change ...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
ISBN 978-1-4244-6965-9International audienceLaser-based fault injections are currently the most effi...
Implementations of cryptographic algorithms continue to proliferate in consumer products due to the ...
International audienceSecurity often relies on functions implemented in hardware. But various types ...
International audienceThe secret keys handled by cryptographic devices can be extracted using fault ...
In this contribution, we present an FPGA-based simulation environment for fault attacks on cryptogra...
This research provides a set of methods, tools and design guidelines that help a designer to constr...
Hardware designers invest a significant design effort when implementing computationally intensive cr...
The effect of faults on electronic systems has been studied since the 1970s when it was noticed that...
ISBN : 978-2-84813-124-5International audienceThis paper summarizes the main types of attacks that c...
Faults attacks are a serious threat to secure devices, because they are powerful and they can be per...
Abstract—For a secure hardware designer, the vast array of fault attacks and countermeasures looks l...
This book constitutes the refereed proceedings of the Third International Workshop on Fault Diagnosi...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
The thesis deals with attacks that cause faults in CPU and MCU calculations. A short voltage change ...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
ISBN 978-1-4244-6965-9International audienceLaser-based fault injections are currently the most effi...
Implementations of cryptographic algorithms continue to proliferate in consumer products due to the ...