Side-Channel Analysis (SCA) and Fault Attacks (FA) are techniques to recover sensitive information in cryptographic systems by exploiting unintentional physical leakage, such as the power consumption. This thesis has two main goals: to draw a review of the state of the art of FPGA-compatible countermeasures against SCA and implement t the selected ones with the minimum area and performances overhead. Symmetrical algorithms, specially AES, are studied and several vulnerabilities of usual protections, namely Dual-rail with Precharge Logic (DPL) and masking are analysed, as well as the issue of performance and area overheads. In this context, three new countermeasures are considered: 1. Balance placement and routing (PAR) strategies aiming at ...
Hardware implementations of mathematically secure algorithms unintentionally leak side channel infor...
Protecting cryptographic implementations against side-channel attacks is a must to prevent leakage o...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
Side-Channel Analysis (SCA) and Fault Attacks (FA) are techniques to recover sensitive information i...
Les attaques en fautes (FA) et par canaux cachés (SCA), permettent de récupérer des données sensible...
Modern field programmable gate arrays (FPGA) are capable of implementing complex system on chip (SoC...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
Abstract—Side Channel Attacks (SCAs) have proven to be very effective in extracting information from...
Abstract—This paper presents hardware implementations of a DES cryptoprocessor with masking counterm...
Abstract—The security threat of side-channel analysis (SCA) attacks has created a need for SCA count...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
This thesis develops an overview of the so called Side Channel Attacks (SCA). In order to counter th...
Conventional dual-rail precharge logic suffers from difficult implementations of dual-rail structure...
Hardware implementations of mathematically secure algorithms unintentionally leak side channel infor...
Protecting cryptographic implementations against side-channel attacks is a must to prevent leakage o...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
Side-Channel Analysis (SCA) and Fault Attacks (FA) are techniques to recover sensitive information i...
Les attaques en fautes (FA) et par canaux cachés (SCA), permettent de récupérer des données sensible...
Modern field programmable gate arrays (FPGA) are capable of implementing complex system on chip (SoC...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
Abstract—Side Channel Attacks (SCAs) have proven to be very effective in extracting information from...
Abstract—This paper presents hardware implementations of a DES cryptoprocessor with masking counterm...
Abstract—The security threat of side-channel analysis (SCA) attacks has created a need for SCA count...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
This thesis develops an overview of the so called Side Channel Attacks (SCA). In order to counter th...
Conventional dual-rail precharge logic suffers from difficult implementations of dual-rail structure...
Hardware implementations of mathematically secure algorithms unintentionally leak side channel infor...
Protecting cryptographic implementations against side-channel attacks is a must to prevent leakage o...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...