A growing number of connected objects, with their high performance and low-resources constraints, are embedding lightweight ciphers for protecting the confidentiality of the data they manipulate or store. Since those objects are easily accessible, they are prone to a whole range of physical attacks, one of which are fault attacks against for which countermeasures are usually expensive to implement, especially on off-the-shelf devices. For such devices, we propose a new generic software countermeasure, called the Internal Redundancy Countermeasure (IRC), to thwart most fault attacks while preserving the performances of the targeted cipher. We report practical experiments showing that IRC successfully thwarts fault attacks on the block cipher...
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique ag...
Context. A fault injection attack consists in modifying an intermediate value of a computation (usin...
Redundancy based countermeasures against fault attacks are a popular choice in security-critical com...
International audienceA growing number of connected objects, with their high performance and low-res...
The Internet of Things has many application areas and offers huge potentials for businesses, industr...
International audienceWith the Internet of Things, an increasing amount of sensitive data have to be...
Abstract—Fault injections constitute a major threat to the security of embedded systems. Errors occu...
International audienceHardware implementations of stream and other ciphers are vulnerable to natural...
International audienceImplementations of cryptographic algorithms continue to proliferate in consume...
Implementations of cryptographic algorithms continue to proliferate in consumer products due to the ...
The widely used countermeasures against fault attacks are based on spatial, temporal, or information...
In this paper we present a bitstream modification attack on the Trivium cipher, an international sta...
International audienceWith the Internet of Things (IoT) an increasing amount of sensitive data have ...
This research provides a set of methods, tools and design guidelines that help a designer to constr...
L’Internet des objets a de nombreux domaines applicatifs et offre ainsi un potentiel immense pour le...
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique ag...
Context. A fault injection attack consists in modifying an intermediate value of a computation (usin...
Redundancy based countermeasures against fault attacks are a popular choice in security-critical com...
International audienceA growing number of connected objects, with their high performance and low-res...
The Internet of Things has many application areas and offers huge potentials for businesses, industr...
International audienceWith the Internet of Things, an increasing amount of sensitive data have to be...
Abstract—Fault injections constitute a major threat to the security of embedded systems. Errors occu...
International audienceHardware implementations of stream and other ciphers are vulnerable to natural...
International audienceImplementations of cryptographic algorithms continue to proliferate in consume...
Implementations of cryptographic algorithms continue to proliferate in consumer products due to the ...
The widely used countermeasures against fault attacks are based on spatial, temporal, or information...
In this paper we present a bitstream modification attack on the Trivium cipher, an international sta...
International audienceWith the Internet of Things (IoT) an increasing amount of sensitive data have ...
This research provides a set of methods, tools and design guidelines that help a designer to constr...
L’Internet des objets a de nombreux domaines applicatifs et offre ainsi un potentiel immense pour le...
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique ag...
Context. A fault injection attack consists in modifying an intermediate value of a computation (usin...
Redundancy based countermeasures against fault attacks are a popular choice in security-critical com...