The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the variation of device emanations to retrieve a secret key. These emanations can be the power consumption, the electromagnetic radiation, etc. Most of the time, those attacks use statistical methods to examine the relationship between the emanations and some leakage models supposed by the attacker. Three main axis are developed here. First, we have implemented many side channel attacks on GPGPU using the API OpenCL. These implementations are more effective than the classical ones, so an attacker can exploit more data. Then, in order to provide a new side channel attack, we have suggested the use of a new dependency measurement proposed by Reshef et a...
Cryptography and security market is growing up at an annual rate of 17 % according to some recent st...
Cryptography and security market is growing up at a annual rate of 17% according to some recent stud...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Since the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun,...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
Cryptography is taking an ever more important part in the life of societies since the users are real...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
The main objective of this PhD thesis is to speedup elliptic curve cryptography (ECC) computations, ...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
Cryptography and security market is growing up at an annual rate of 17 % according to some recent st...
Cryptography and security market is growing up at a annual rate of 17% according to some recent stud...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Since the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun,...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
Cryptography is taking an ever more important part in the life of societies since the users are real...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
The main objective of this PhD thesis is to speedup elliptic curve cryptography (ECC) computations, ...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
Cryptography and security market is growing up at an annual rate of 17 % according to some recent st...
Cryptography and security market is growing up at a annual rate of 17% according to some recent stud...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...