The invention relates to a method for handling data (A, B) between two memory areas (W, R1, R2) of an electronic component comprising at least one working memory area (W) for carrying out operations on said component bringing into play at least one of said data. The inventive method is characterized in that it involves the use of the same memory areas for executing an operation whatever the operation to be executed is in such a manner that each operation has a hidden signal trace that is identical in terms of location leakage outside this component
Security issues become more and more important during the development of mobile devices. In this pap...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
We offer a secure hardware architecture for system boot up, secure software execution and on field u...
A tamper-resistant electronic circuit is configured for implementation in a device. The electronic c...
International audienceSecure components are subject to physical attacks whose aim is to recover the ...
The last decade has recorded an increase in security protocols for integrated circuits and memory sy...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
Methods and apparatus for encrypting and storing data. The methods and apparatus provide different l...
A method of protecting an electronic device from unauthorized reprogramming, the electronic device c...
A message authentication code, MAC, is generated in an electronic circuit, wherein the MAC integrity...
The widening spectrum of applications and services provided by portable and embedded devices bring a...
International audienceSystem security is an increasingly important design criterion for many embedde...
Abstract. Modern cryptographic algorithms are secure against crypt-analysis. However they are implem...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
Security issues become more and more important during the development of mobile devices. In this pap...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
We offer a secure hardware architecture for system boot up, secure software execution and on field u...
A tamper-resistant electronic circuit is configured for implementation in a device. The electronic c...
International audienceSecure components are subject to physical attacks whose aim is to recover the ...
The last decade has recorded an increase in security protocols for integrated circuits and memory sy...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
Methods and apparatus for encrypting and storing data. The methods and apparatus provide different l...
A method of protecting an electronic device from unauthorized reprogramming, the electronic device c...
A message authentication code, MAC, is generated in an electronic circuit, wherein the MAC integrity...
The widening spectrum of applications and services provided by portable and embedded devices bring a...
International audienceSystem security is an increasingly important design criterion for many embedde...
Abstract. Modern cryptographic algorithms are secure against crypt-analysis. However they are implem...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
Security issues become more and more important during the development of mobile devices. In this pap...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
We offer a secure hardware architecture for system boot up, secure software execution and on field u...