Bitslicing is a technique commonly used in cryptography to implement high-throughput parallel and constant-time symmetric primitives. However, writing, optimizing and protecting bitsliced implementations by hand are tedious tasks, requiring knowledge in cryptography, CPU microarchitectures and side-channel attacks. The resulting programs tend to be hard to maintain due to their high complexity. To overcome those issues, we propose Usuba, a high-level domain-specific language to write symmetric cryptographic primitives. Usuba allows developers to write high-level specifications of ciphers without worrying about the actual parallelization: an Usuba program is a scalar description of a cipher, from which the Usuba compiler (Usubac) automatical...
Communications are one of the key functions in future vehicles and require protection. Cryptography ...
Modern digital communication relies heavily on cryptographic protection to ensure data integrity and...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
Bitslicing is a technique commonly used in cryptography to implement high-throughput parallel and co...
International audienceBitslicing is a programming technique commonly used in cryptography that consi...
International audienceCryptographic primitives are subject to diverging imperatives. Functional corr...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
International audienceUntil now, most cryptography implementations on parallel architectures have fo...
In this paper, we optimize the performances and compare several recent masking schemes in bitslice o...
Nowadays, the dataflux shared between IoT systems must be secured from 8-bits to 64-bits processor...
International audienceThe design of software countermeasures against active and passive adversaries ...
Les logiciels informatiques manipulent fréquemment des données secrètes, garantissant généralement l...
Les attaques par canaux auxiliaires ont traditionnellement permis d’exploiter les vulnérabilités des...
The article is devoted to methods and tools for generating software-oriented bit-sliced descriptions...
Since their introduction at the end of the 1990s, side-channel attacks are considered to be a major ...
Communications are one of the key functions in future vehicles and require protection. Cryptography ...
Modern digital communication relies heavily on cryptographic protection to ensure data integrity and...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
Bitslicing is a technique commonly used in cryptography to implement high-throughput parallel and co...
International audienceBitslicing is a programming technique commonly used in cryptography that consi...
International audienceCryptographic primitives are subject to diverging imperatives. Functional corr...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
International audienceUntil now, most cryptography implementations on parallel architectures have fo...
In this paper, we optimize the performances and compare several recent masking schemes in bitslice o...
Nowadays, the dataflux shared between IoT systems must be secured from 8-bits to 64-bits processor...
International audienceThe design of software countermeasures against active and passive adversaries ...
Les logiciels informatiques manipulent fréquemment des données secrètes, garantissant généralement l...
Les attaques par canaux auxiliaires ont traditionnellement permis d’exploiter les vulnérabilités des...
The article is devoted to methods and tools for generating software-oriented bit-sliced descriptions...
Since their introduction at the end of the 1990s, side-channel attacks are considered to be a major ...
Communications are one of the key functions in future vehicles and require protection. Cryptography ...
Modern digital communication relies heavily on cryptographic protection to ensure data integrity and...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...