Cryptosystems are present in a lot of everyday life devices, such as smart cards, smartphones, set-top-boxes or passports. The security of these devices is threatened by side-channel attacks, where an attacker observes their physical behavior to learn information about the manipulated secrets. The evaluation of the resilience of products against such attacks is mandatory to ensure the robustness of the embedded cryptography. In this thesis, we exhibit a methodology to efficiently evaluate the success rate of side-channel attacks, without the need to actually perform them. In particular, we build upon a paper written by Rivain in 2009, and exhibit explicit formulaes allowing to accurately compute the success rate of high-order side-channel a...
The security of Internet applications relies crucially on the secure design and robust implementatio...
The goal of this work is to obtain implementations of security protocols proved in the computational...
Historically, malware (MW) analysis has heavily resorted to human savvy for manual signature creatio...
The 10th Hilbert problem, which consists in finding integer solutions to polynomial equations is a c...
The concern over the security of the infrastructure of a company is only growing deeper and became a...
In the recent time, the field of image steganalysis and steganography became more important due to t...
The work done during this Ph.D. lies at the crossroads of symmetric cryptography and constraints env...
Cryptographic circuits are vulnerable to various side-channel attacks that target their hardware imp...
This PhD project takes place in List MAPS, a Horizon 2020-funded Marie Curie Actions InnovativeTrain...
Many aspects of our current life rely on the exchange of data through electronic media. Powerful enc...
I propose a new method of analyzing intrusions: instead of analyzing evidence and deducing what must...
With the advent of Location-Based-Systems, positioning systems must face new security requirements: ...
Society is advancing by leaps and bounds in terms of technology in recent decades. These advances co...
Designing integrated circuits is now an extremely complex task. This is why designers adopt a modula...
The security of image and video data is important formany applications which require in real-time a ...
The security of Internet applications relies crucially on the secure design and robust implementatio...
The goal of this work is to obtain implementations of security protocols proved in the computational...
Historically, malware (MW) analysis has heavily resorted to human savvy for manual signature creatio...
The 10th Hilbert problem, which consists in finding integer solutions to polynomial equations is a c...
The concern over the security of the infrastructure of a company is only growing deeper and became a...
In the recent time, the field of image steganalysis and steganography became more important due to t...
The work done during this Ph.D. lies at the crossroads of symmetric cryptography and constraints env...
Cryptographic circuits are vulnerable to various side-channel attacks that target their hardware imp...
This PhD project takes place in List MAPS, a Horizon 2020-funded Marie Curie Actions InnovativeTrain...
Many aspects of our current life rely on the exchange of data through electronic media. Powerful enc...
I propose a new method of analyzing intrusions: instead of analyzing evidence and deducing what must...
With the advent of Location-Based-Systems, positioning systems must face new security requirements: ...
Society is advancing by leaps and bounds in terms of technology in recent decades. These advances co...
Designing integrated circuits is now an extremely complex task. This is why designers adopt a modula...
The security of image and video data is important formany applications which require in real-time a ...
The security of Internet applications relies crucially on the secure design and robust implementatio...
The goal of this work is to obtain implementations of security protocols proved in the computational...
Historically, malware (MW) analysis has heavily resorted to human savvy for manual signature creatio...