The research work practiced in this PhD program is dedicated to investigating the use of machine learning in creating novel security solutions based on Physically Unclonable Functions (PUF) for resource constrained systems. PUF is considered a hardware primitive for security algorithms to create device identifiers and encryption key values. The capability of PUF in certain variants (i.e., strong PUF) is to generate large number of CRPs. Thus, to enroll PUF, it is required to use a technique to capture and store the CRPs for later use. The conventional technique is to consider creating a database of CRPs. However, as the PUF structures evolved over time, their capability to generate very large number of CRPs also increased drastically. This ...
Fault injection is a well known method to test the robustness and security vulnerabilities of system...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...
Architectures of cryptographic processors and coprocessors are often vulnerable to different kinds o...
Le travail de recherche pratiqué dans ce programme de doctorat est consacré à l'étude de l'utilisati...
The demand for internet of Things (IoT) services is increasing exponentially, and a large number of ...
Today mobile devices are an integral part of our lives with the development of applications. In addi...
In this thesis, we investigate the possibility of basing cryptographic primitives on Physically Uncl...
The information society we belong to heavily relies on secure information exchanges. To exchange inf...
Physical Unclonable Functions (PUFs) are promising security primitives for device authenti-cation an...
Aujourd'hui les équipements mobiles font partie intégrante de nos vies avec le développement des app...
Cryptography studies how to secure communications and information. The security of a cryptosystem de...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
Prognostics & Health Management (PHM) aims at extending the life cycle of an engineering asset, whil...
Fault injection is a well known method to test the robustness and security vulnerabilities of system...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...
Architectures of cryptographic processors and coprocessors are often vulnerable to different kinds o...
Le travail de recherche pratiqué dans ce programme de doctorat est consacré à l'étude de l'utilisati...
The demand for internet of Things (IoT) services is increasing exponentially, and a large number of ...
Today mobile devices are an integral part of our lives with the development of applications. In addi...
In this thesis, we investigate the possibility of basing cryptographic primitives on Physically Uncl...
The information society we belong to heavily relies on secure information exchanges. To exchange inf...
Physical Unclonable Functions (PUFs) are promising security primitives for device authenti-cation an...
Aujourd'hui les équipements mobiles font partie intégrante de nos vies avec le développement des app...
Cryptography studies how to secure communications and information. The security of a cryptosystem de...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
Prognostics & Health Management (PHM) aims at extending the life cycle of an engineering asset, whil...
Fault injection is a well known method to test the robustness and security vulnerabilities of system...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...
Architectures of cryptographic processors and coprocessors are often vulnerable to different kinds o...