Abstract--- A lot of devices which are daily used have to guarantee the retention of sensible data. Sensible data are ciphered by a secure key by which only the key holder can get the data. For this reason, to protect the cipher key against possible attacks becomes a main issue. The research activities in hardware cryptography are involved in finding new countermeasures against various attack scenarios and, in the same time, in studying new attack methodologies. During the PhD, three different logic families to counteract Power Analysis were presented and a novel class of attacks was studied. Moreover, two different activities related to Random Numbers Generators have been addressed
Side channels affect a security of the cryptographic systems, due to it is necessary to focus on imp...
Cryptographic devices produce not only the output data but also some additional information like pow...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...
Abstract--- A lot of devices which are daily used have to guarantee the retention of sensible data. ...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
International audienceThis chapter presents the main Side-Channel Attacks, a kind of hardware crypta...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Cryptography algorithms, such as Advanced Encryption Standard (AES) algorithm, are responsible for k...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
Hardware implementations of mathematically secure algorithms unintentionally leak side channel infor...
National audienceSecurity is a key component for information technologies and communication. Securit...
Cryptographic devices are vulnerable to so-called Side Channel Attacks. As attackers become smarter,...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Side channels affect a security of the cryptographic systems, due to it is necessary to focus on imp...
Cryptographic devices produce not only the output data but also some additional information like pow...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...
Abstract--- A lot of devices which are daily used have to guarantee the retention of sensible data. ...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
International audienceThis chapter presents the main Side-Channel Attacks, a kind of hardware crypta...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Cryptography algorithms, such as Advanced Encryption Standard (AES) algorithm, are responsible for k...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
Hardware implementations of mathematically secure algorithms unintentionally leak side channel infor...
National audienceSecurity is a key component for information technologies and communication. Securit...
Cryptographic devices are vulnerable to so-called Side Channel Attacks. As attackers become smarter,...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Side channels affect a security of the cryptographic systems, due to it is necessary to focus on imp...
Cryptographic devices produce not only the output data but also some additional information like pow...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...