Side-channel and fault injection analyses are well-known domains that have been used for years to evaluate the resistance of hardware based products. These techniques remain a threat for the secret assets embedded in products like smart cards or System On Chip. But most of these products contain nowadays several strong protections rendering side-channel and fault attacks difficult or inefficient. For two decades embedded cryptography for payment, pay tv, identity areas have relied a lot on secure elements. Nowadays more alternative solutions on mobile phones appear with the aim to offer software-based security services including payment and security solutions as the HCE and DRM products. Cryptographic operations running in such applications...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
Despite the fact that all current scientific white-box approaches of standardized cryptographic prim...
Despite the fact that all current scientific white-box approaches of standardized cryptographic prim...
Abstract. Side-channel and fault injection analyses are well-known domains that have been used for y...
National audienceSecurity is a key component for information technologies and communication. Securit...
International audienceSecurity is a key component for information technologies and communication. Am...
International audiencePhysical attacks on cryptographic circuits were first identified in the late 1...
International audienceToday’s mobile devices contain densely packaged system-on-chips (SoCs) with mu...
Sensitive systems that are based on smart cards use well-studied and well-developed cryptosystems. G...
Physical attacks are serious threats to hardware implementations of any strong cryptographic primiti...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
Implementations of cryptographic algorithms continue to proliferate in consumer products due to the ...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
International audienceImplementations of cryptographic algorithms continue to proliferate in consume...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
Despite the fact that all current scientific white-box approaches of standardized cryptographic prim...
Despite the fact that all current scientific white-box approaches of standardized cryptographic prim...
Abstract. Side-channel and fault injection analyses are well-known domains that have been used for y...
National audienceSecurity is a key component for information technologies and communication. Securit...
International audienceSecurity is a key component for information technologies and communication. Am...
International audiencePhysical attacks on cryptographic circuits were first identified in the late 1...
International audienceToday’s mobile devices contain densely packaged system-on-chips (SoCs) with mu...
Sensitive systems that are based on smart cards use well-studied and well-developed cryptosystems. G...
Physical attacks are serious threats to hardware implementations of any strong cryptographic primiti...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
Implementations of cryptographic algorithms continue to proliferate in consumer products due to the ...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
International audienceImplementations of cryptographic algorithms continue to proliferate in consume...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
Despite the fact that all current scientific white-box approaches of standardized cryptographic prim...
Despite the fact that all current scientific white-box approaches of standardized cryptographic prim...