International audienceSecurity is a key component of communication and information technology systems: Integrated Circuits (ICs) implementing cryptographic algorithms are used for data confidentiality and integrity or for user/device authentication. Such ICs can be vulnerable to several kinds of attacks. Among them, ``hardware attacks'', that require a physical access to the circuit, can be used to retrieve cryptographic data (such as ``keys'') in efficient ways. For example, ``observation attacks'' consist in observing some physical characteristics (such as the power consumption or electromagnetic radiation) which are modified during an IC's computation. A second family of hardware attacks is that of ``perturbation attacks'' which consist ...
The growing interest in the Internet of Things (IoT) has led to predictions claiming that by 2020 we...
The consumption of integrated circuits has been increasing over the last decade. With the increase o...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
International audienceSecurity is a key component of communication and information technology system...
International audienceSecurity is a key component for information technologies and communication. Am...
Technical reportSecurity is a key component for information technologies and communication. Among th...
International audienceSecurity is a key component for information technologies and communication. Am...
Embedded systems are found in many safety- and security-critical applications, and bring aspects of ...
Hardware support for security mechanisms such as authentication, cryptographic protocols, digital ri...
Advancements in CMOS technologies have led to an era of Internet Of Things (IOT), where the devices ...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
National audienceSecurity is a key component for information technologies and communication. Securit...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
iii Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weak...
Unintentional electromagnetic emissions are used to recognize or verify the identity of a unique int...
The growing interest in the Internet of Things (IoT) has led to predictions claiming that by 2020 we...
The consumption of integrated circuits has been increasing over the last decade. With the increase o...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
International audienceSecurity is a key component of communication and information technology system...
International audienceSecurity is a key component for information technologies and communication. Am...
Technical reportSecurity is a key component for information technologies and communication. Among th...
International audienceSecurity is a key component for information technologies and communication. Am...
Embedded systems are found in many safety- and security-critical applications, and bring aspects of ...
Hardware support for security mechanisms such as authentication, cryptographic protocols, digital ri...
Advancements in CMOS technologies have led to an era of Internet Of Things (IOT), where the devices ...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
National audienceSecurity is a key component for information technologies and communication. Securit...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
iii Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weak...
Unintentional electromagnetic emissions are used to recognize or verify the identity of a unique int...
The growing interest in the Internet of Things (IoT) has led to predictions claiming that by 2020 we...
The consumption of integrated circuits has been increasing over the last decade. With the increase o...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...