International audienceIn critical communication infrastructures, hardware accelerators are often used to speed up cryptographic calculations. Their resistance to physical attacks determines how secure the overall infrastructure is. In this paper, we describe the implementation and characterisation of an AES accelerator embedding security features against physical attacks. This AES chip is implemented in HCMOS9gp 130nm STM technology. The countermeasure is based on duplication and works on complemented values in parallel. The chip was tested against side-channel attacks showing the efficiency of the proposed countermeasure against such attacks. Fault injection tests based on the use of local laser shoots showed that the fault detection mecha...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
Side Channel Analysis (SCA) is composed of a bunch of techniques employed to extract secret informat...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
International audienceA secure AES chip was implemented in HCMOS9gp 130nm STM technology. The counte...
Dans cette thèse, Nous présentons différents aspects d'attaques physiques sur les implémentations cr...
International audienceThe secret keys manipulated by cryptographic circuits can be extracted using f...
International audienceThe AES is a standard encryption algorithm used in numerous cryptographic syst...
Fault and power attacks are two common ways of extracting secrets from tamper-resistant chips. Altho...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
This master thesis aims at securing cryptographic devices against two common types of attacks: side-...
Cryptography algorithms, such as Advanced Encryption Standard (AES) algorithm, are responsible for k...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
In the recent years the number of interconnected devices involved in our life is rapidly growing. Th...
Embedded security is a field studying how the physical implementations of cryptosystems can weaken t...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
Side Channel Analysis (SCA) is composed of a bunch of techniques employed to extract secret informat...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
International audienceA secure AES chip was implemented in HCMOS9gp 130nm STM technology. The counte...
Dans cette thèse, Nous présentons différents aspects d'attaques physiques sur les implémentations cr...
International audienceThe secret keys manipulated by cryptographic circuits can be extracted using f...
International audienceThe AES is a standard encryption algorithm used in numerous cryptographic syst...
Fault and power attacks are two common ways of extracting secrets from tamper-resistant chips. Altho...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
This master thesis aims at securing cryptographic devices against two common types of attacks: side-...
Cryptography algorithms, such as Advanced Encryption Standard (AES) algorithm, are responsible for k...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
In the recent years the number of interconnected devices involved in our life is rapidly growing. Th...
Embedded security is a field studying how the physical implementations of cryptosystems can weaken t...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
Side Channel Analysis (SCA) is composed of a bunch of techniques employed to extract secret informat...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...