Physical attacks, including passive Side-Channel Analysis and active Fault Injection Analysis, are considered among the most powerful threats against physical cryptographic implementations. These attacks are well known and research provides many specialized countermeasures to protect cryptographic implementations against them. Still, only a limited number of combined countermeasures, i.e., countermeasures that protect implementations against multiple attacks simultaneously, were proposed in the past. Due to increasing complexity and reciprocal effects, design of efficient and reliable combined countermeasures requires longstanding expertise in hardware design and security. With the help of formal security specifications and adversary models...
Protection against Side-Channel (SCA) and Fault Attacks (FA) requires two classes of countermeasures...
Abstract--- A lot of devices which are daily used have to guarantee the retention of sensible data. ...
Masking is a widely used countermeasure against Side-Channel Attacks (SCA), but the implementation o...
Physical attacks, including passive Side-Channel Analysis and active Fault Injection Analysis, are c...
Physical attacks, including passive Side-Channel Analysis and active Fault Injection Analysis, are c...
National audienceSecurity is a key component for information technologies and communication. Securit...
International audienceSecurity is a key component for information technologies and communication. Am...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
Technical reportThe security of cryptographic algorithms can be considered in two contexts. On the o...
Physical attacks are serious threats to hardware implementations of any strong cryptographic primiti...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
In this paper we introduce two things: On one hand we introduce the Tile-Probe-and-Fault model, a mo...
Protection against Side-Channel (SCA) and Fault Attacks (FA) requires two classes of countermeasures...
Abstract--- A lot of devices which are daily used have to guarantee the retention of sensible data. ...
Masking is a widely used countermeasure against Side-Channel Attacks (SCA), but the implementation o...
Physical attacks, including passive Side-Channel Analysis and active Fault Injection Analysis, are c...
Physical attacks, including passive Side-Channel Analysis and active Fault Injection Analysis, are c...
National audienceSecurity is a key component for information technologies and communication. Securit...
International audienceSecurity is a key component for information technologies and communication. Am...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
Technical reportThe security of cryptographic algorithms can be considered in two contexts. On the o...
Physical attacks are serious threats to hardware implementations of any strong cryptographic primiti...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
In this paper we introduce two things: On one hand we introduce the Tile-Probe-and-Fault model, a mo...
Protection against Side-Channel (SCA) and Fault Attacks (FA) requires two classes of countermeasures...
Abstract--- A lot of devices which are daily used have to guarantee the retention of sensible data. ...
Masking is a widely used countermeasure against Side-Channel Attacks (SCA), but the implementation o...