The main subject of this work is the physical cryptanalysis of blocks ciphers. Even if cryptographic algorithms are properly designed mathematically, they may be vulnerable to physical attacks. Physical attacks are mainly divided in two families: the side channel attacks which are based on the observation of the circuit behaviour during the computation, and the fault injection attacks which consist in disturbing the computation in order to alter the correct progress of the algorithm. These attacks are used to target the cipher key or to reverse engineer the algorithm. A formalism is proposed in order to describe the two families in a unified way. Unifying the different attacks under a same formalism allows to deal with them with common math...
Cryptography is taking an ever more important part in the life of societies since the users are real...
Membre du Jury : von zur Gathen, Joachim et Coppersmith, Don et Berger, Thierry et Villard, Gillles ...
This thesis explores two different approaches to reduce the size of the public key cryptosystems bas...
Even if a cryptographic algortihm could be mathematically secure, its physical implementation could ...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
Since the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun,...
Radio Frequency IDentification allows quick and secure identification of objects. In mass customisat...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Cryptography is taking an ever more important part in the life of societies since the users are real...
Membre du Jury : von zur Gathen, Joachim et Coppersmith, Don et Berger, Thierry et Villard, Gillles ...
This thesis explores two different approaches to reduce the size of the public key cryptosystems bas...
Even if a cryptographic algortihm could be mathematically secure, its physical implementation could ...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
Since the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun,...
Radio Frequency IDentification allows quick and secure identification of objects. In mass customisat...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Cryptography is taking an ever more important part in the life of societies since the users are real...
Membre du Jury : von zur Gathen, Joachim et Coppersmith, Don et Berger, Thierry et Villard, Gillles ...
This thesis explores two different approaches to reduce the size of the public key cryptosystems bas...