International audienceThe use of a laser as a means to inject errors during the computations of a secure integrated circuit (IC) for the purpose of retrieving secret data was first reported in 2002. Since then, a lot of research work, mainly experimental, has been carried out to study this threat. This paper reports research conducted, in the framework of the french national project LIESSE, to obtain an electrical model of the laser effects on CMOS ICs. Based on simulation, a first model permitted us to draw the laser sensitivity map of a SRAM cell. It demonstrates a very close correlation with experimental measures. We also introduce the preliminary results we gathered to build a similar electrical model for FD-SOI circuits. FD-SOI technol...
This present work deals with the analysis and study of the integrated circuits behavior in CMOS tech...
International audienceThis paper presents the design of an SRAM cell with a robustness improvement a...
De nombreux aspects de notre vie courante reposent sur l'échange de données grâce à des systèmes de ...
International audienceThe use of a laser as a means to inject errors during the computations of a se...
International audienceAmong all means to attack a security dedicated circuit, fault injection by mea...
From time immemorial, human beings have been forced to protect the fruits of their creativity and en...
International audienceAt first used to emulate the effects of radioactive ionizing particules passin...
International audienceIntegrated circuits (ICs) laser illumination was originally used for emulation...
Nowadays, more and more microelectronic circuits are used for critical purposes, such as payment or ...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
More and more sensitive data are stored inside smart cards, like bank account or car access codes. R...
De nos jours, de plus en plus de circuits électroniques sont utilisés pour des usages critiques, tel...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
International audience—This paper presents the design of a CMOS 40 nm D Flip-Flop cell and reports t...
International audienceLasers have become one of the most efficient means to attack secure integrated...
This present work deals with the analysis and study of the integrated circuits behavior in CMOS tech...
International audienceThis paper presents the design of an SRAM cell with a robustness improvement a...
De nombreux aspects de notre vie courante reposent sur l'échange de données grâce à des systèmes de ...
International audienceThe use of a laser as a means to inject errors during the computations of a se...
International audienceAmong all means to attack a security dedicated circuit, fault injection by mea...
From time immemorial, human beings have been forced to protect the fruits of their creativity and en...
International audienceAt first used to emulate the effects of radioactive ionizing particules passin...
International audienceIntegrated circuits (ICs) laser illumination was originally used for emulation...
Nowadays, more and more microelectronic circuits are used for critical purposes, such as payment or ...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
More and more sensitive data are stored inside smart cards, like bank account or car access codes. R...
De nos jours, de plus en plus de circuits électroniques sont utilisés pour des usages critiques, tel...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
International audience—This paper presents the design of a CMOS 40 nm D Flip-Flop cell and reports t...
International audienceLasers have become one of the most efficient means to attack secure integrated...
This present work deals with the analysis and study of the integrated circuits behavior in CMOS tech...
International audienceThis paper presents the design of an SRAM cell with a robustness improvement a...
De nombreux aspects de notre vie courante reposent sur l'échange de données grâce à des systèmes de ...