Photons can be exploited to reveal secrets of security ICs like smartcards, secure microcontrollers, and cryptographic coprocessors. One such secret is the secret key of cryptographic algorithms. This work gives an overview about current research on revealing these secret keys by exploiting the photonic side channel. Different analysis methods are presented. It is shown that the analysis of photonic emissions also helps to gain knowledge about the attacked device and thus poses a threat to modern security ICs. The presented results illustrate the differences between the photonic and other side channels, which do not provide fine-grained spatial information. It is shown that the photonic side channel has to be addressed by software engineers...
This master thesis deals about the issues of chip cards’ side channels. Side channels are new method...
Quantum key distribution (QKD)1 is a quantum technology already present in the market. This technolo...
International audienceThis paper describes a new countermeasure against side-channel power attacks. ...
A universal circuit (UC) can be thought of as a programmable circuit that can simulate any circuit u...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...
This work proposes substantial algorithmic enhancements to the SPEA attack of Schlosser et al. by ad...
Developing an unbreakable cryptography is a longstanding question and a global challenge in the inte...
Mobile appliances and especially smart cards have found more and more applications in the past two d...
The work summarizes author's three main results during the doctoral studies published at SAC '06 and...
This paper describes the first attack utilizing the photonic side channel against a public-key crypt...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
In this era of digital revolution, computer security is at the center of many issues. Passwords are ...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
International audienceThis chapter presents the main Side-Channel Attacks, a kind of hardware crypta...
Quantum key distribution (QKD)(1) is a quantum technology already present in the market. This techno...
This master thesis deals about the issues of chip cards’ side channels. Side channels are new method...
Quantum key distribution (QKD)1 is a quantum technology already present in the market. This technolo...
International audienceThis paper describes a new countermeasure against side-channel power attacks. ...
A universal circuit (UC) can be thought of as a programmable circuit that can simulate any circuit u...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...
This work proposes substantial algorithmic enhancements to the SPEA attack of Schlosser et al. by ad...
Developing an unbreakable cryptography is a longstanding question and a global challenge in the inte...
Mobile appliances and especially smart cards have found more and more applications in the past two d...
The work summarizes author's three main results during the doctoral studies published at SAC '06 and...
This paper describes the first attack utilizing the photonic side channel against a public-key crypt...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
In this era of digital revolution, computer security is at the center of many issues. Passwords are ...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
International audienceThis chapter presents the main Side-Channel Attacks, a kind of hardware crypta...
Quantum key distribution (QKD)(1) is a quantum technology already present in the market. This techno...
This master thesis deals about the issues of chip cards’ side channels. Side channels are new method...
Quantum key distribution (QKD)1 is a quantum technology already present in the market. This technolo...
International audienceThis paper describes a new countermeasure against side-channel power attacks. ...