International audienceWith the Internet of Things, an increasing amount of sensitive data have to be communicated and hence encrypted. Low-cost hardware attacks such as fault analysis or side-channel analysis threaten the implementation of cryptographic algorithms. Many countermeasures have been proposed against either of these attacks, however, only a few countermeasures protect efficiently an implementation against both attacks. These joint countermeasures usually have a prohibitive area and power overhead, and require up to thousands of bits of fresh randomness at each encryption. Therefore, they may not be suited to protect lightweight algorithms in resource-constrained devices. In this paper, we propose a new joint countermeasure again...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
In this work, the implementation of the PRESENT-80 block cipher in a 40nm CMOS technology, and its v...
Cryptographic devices are the targets of side-channel attacks, which exploit physical characteristic...
International audienceWith the Internet of Things, an increasing amount of sensitive data have to be...
International audienceWith the Internet of Things (IoT) an increasing amount of sensitive data have ...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
Dynamically reconfigurable systems are known to have many advantages such as area and power reductio...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Abstract. Dynamically reconfigurable systems are known to have many advantages such as area and powe...
Abstract--- A lot of devices which are daily used have to guarantee the retention of sensible data. ...
With the explosion in the number of internet of things (IoT) devices in recent years, the security o...
Cryptography algorithms, such as Advanced Encryption Standard (AES) algorithm, are responsible for k...
Abstract—Side Channel Attacks (SCAs) have proven to be very effective in extracting information from...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
In this work, the implementation of the PRESENT-80 block cipher in a 40nm CMOS technology, and its v...
Cryptographic devices are the targets of side-channel attacks, which exploit physical characteristic...
International audienceWith the Internet of Things, an increasing amount of sensitive data have to be...
International audienceWith the Internet of Things (IoT) an increasing amount of sensitive data have ...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
Dynamically reconfigurable systems are known to have many advantages such as area and power reductio...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Abstract. Dynamically reconfigurable systems are known to have many advantages such as area and powe...
Abstract--- A lot of devices which are daily used have to guarantee the retention of sensible data. ...
With the explosion in the number of internet of things (IoT) devices in recent years, the security o...
Cryptography algorithms, such as Advanced Encryption Standard (AES) algorithm, are responsible for k...
Abstract—Side Channel Attacks (SCAs) have proven to be very effective in extracting information from...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
In this work, the implementation of the PRESENT-80 block cipher in a 40nm CMOS technology, and its v...
Cryptographic devices are the targets of side-channel attacks, which exploit physical characteristic...