For modern cryptography, the security of a system is defined as the sum of the resources required to break it. With the advent of efficient quantum computers and the new algorithmic possibilities that this opens, this amount of resource is destined to change.In this thesis, we take a step towards a better understanding of this quantum threat. After an introduction to quantum computation and cryptography, we show quantum attacks against the Legendre PRF in the setting without superposition queries and reduced quantum memory. Afterwards, we present a general way to transpose boomerang attacks into quantum attacks as well as some applications. We continue on a doubling method for block ciphers inspired by the Encrypt-Mix-Encrypt scheme and pro...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
The principle of quantum information relies on processing information, not from a classical point of...
Modern cryptography relies on the notion of computational security. The level of security given by a...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
This thesis is about symmetric, or private key, cryptography. It has a focus on modes of operation a...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
The quantum computer is a threat to cryptography as it can solve the problems upon which relies the ...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...
La mécanique quantique offre un avantage indéniable sur la mécanique classique pour la réalisation d...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
The last ten years saw tremendous progress in nanofabrication techniques. These progresses allowed t...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
The principle of quantum information relies on processing information, not from a classical point of...
Modern cryptography relies on the notion of computational security. The level of security given by a...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
This thesis is about symmetric, or private key, cryptography. It has a focus on modes of operation a...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
The quantum computer is a threat to cryptography as it can solve the problems upon which relies the ...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...
La mécanique quantique offre un avantage indéniable sur la mécanique classique pour la réalisation d...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
The last ten years saw tremendous progress in nanofabrication techniques. These progresses allowed t...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
The principle of quantum information relies on processing information, not from a classical point of...