ISBN : 978-2-84813-141-2This thesis focuses on the design and the validation of an embedded FPGA dedicated to critical applications which require a high level of security and confidentiality. Nowadays FPGAs exhibit many weaknesses toward security: 1- They are not intended to efficiently support alternative styles of circuits such as asynchronous circuits. 2- The place and route flow is not completely manageable by the user in order to target our security goal. 3-They are not protected against side channel attacks such as DPA, EMA or DFA. In order to overcome these technological problems, the work presented in this thesis proposes an architecture that supports the programming of different styles of asynchronous circuits. In addition, it pres...
Embedded security applications are diverse and at the center of all personal embedded applications. ...
De nombreuses applications imposent des contraintes de sécurité élevées (notamment au sens confident...
Many applications require achieving high security level (confidentiality or integrity). My thesis is...
ISBN : 978-2-84813-141-2This thesis focuses on the design and the validation of an embedded FPGA ded...
La cryptologie est un moyen de protéger la confidentialité, d'assurer l'intégrité, ou d'authentifier...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
Les motivations pour employer des FPGAs (Field-Programmable Gate Array) dans les applications sécuri...
ISBN 2-84813-077-6This work is focused on the development of new design techniques forprotecting int...
The work presented in this thesis deals with the development of a design methodology for Quasi Delay...
Abstract—This article presents an asynchronous FPGA architecture for implementing cryptographic algo...
International audienceThis article presents an FPGA tech-mapping algorithm dedicated to security app...
Whether through smartphones, portable game consoles, or high performances computing, Systems-on-Chip...
Embedded processors are today ubiquitous, dozen of them compose and orchestrate every technology sur...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
New hardware cryptanalysis methods such as fault-based attacks have shown their efficiency to break ...
Embedded security applications are diverse and at the center of all personal embedded applications. ...
De nombreuses applications imposent des contraintes de sécurité élevées (notamment au sens confident...
Many applications require achieving high security level (confidentiality or integrity). My thesis is...
ISBN : 978-2-84813-141-2This thesis focuses on the design and the validation of an embedded FPGA ded...
La cryptologie est un moyen de protéger la confidentialité, d'assurer l'intégrité, ou d'authentifier...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
Les motivations pour employer des FPGAs (Field-Programmable Gate Array) dans les applications sécuri...
ISBN 2-84813-077-6This work is focused on the development of new design techniques forprotecting int...
The work presented in this thesis deals with the development of a design methodology for Quasi Delay...
Abstract—This article presents an asynchronous FPGA architecture for implementing cryptographic algo...
International audienceThis article presents an FPGA tech-mapping algorithm dedicated to security app...
Whether through smartphones, portable game consoles, or high performances computing, Systems-on-Chip...
Embedded processors are today ubiquitous, dozen of them compose and orchestrate every technology sur...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
New hardware cryptanalysis methods such as fault-based attacks have shown their efficiency to break ...
Embedded security applications are diverse and at the center of all personal embedded applications. ...
De nombreuses applications imposent des contraintes de sécurité élevées (notamment au sens confident...
Many applications require achieving high security level (confidentiality or integrity). My thesis is...