Many applications require achieving high security level (confidentiality or integrity). My thesis is about hardware acceleration of asymmetric cryptography based on elliptic curves (ECC). These systems are rarely in a controlled environment. With this in mind, I consider potential attackers with physical access to the cryptographic device.In this context, a very flexible crypto-processor was developed that can be implemented as an ASIC or on FPGAs. To choose protections against physical attacks (power consumption analysis, fault injection, etc), I evaluate the security against side-channel attacks and the cost of the counter-measure based on operation unification. By mounting a new attack against a chip using Jacobi quartic curves, I show t...
National audienceWe present our first results on the extension of computation accelerators designed ...
This thesis deals with issues related to the implementation of cryptography on elliptic curves in a ...
Elliptic Curve Cryptography (ECC) is more and more used in public-key cryptosystems, especially beca...
Many applications require achieving high security level (confidentiality or integrity). My thesis is...
De nombreuses applications imposent des contraintes de sécurité élevées (notamment au sens confident...
Elliptic Curve Cryptography (ECC) has gained much importance in smart cards because of its higher sp...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
La Cryptographie sur les Courbes Elliptiques (abréviée ECC de l'anglais Elliptic Curve Cryptography)...
Elliptic curve based cryptosystems are nowadays increasingly used in protocols involving public-key ...
The protection of cryptographic mechanisms is an important challenge while developing a system of in...
Since their invention in the mid 1980s, Elliptic Curve Cryptosystems (ECC) have become an alternativ...
Les systèmes cryptographiques à base de courbes elliptiques sont aujourd'hui de plus en plus employé...
La cryptologie est un moyen de protéger la confidentialité, d'assurer l'intégrité, ou d'authentifier...
The emergence of embedded systems has enabled the development of wireless sensor networks indifferen...
This PhD thesis focuses on the study, the hardware design, the theoretical and practical validation,...
National audienceWe present our first results on the extension of computation accelerators designed ...
This thesis deals with issues related to the implementation of cryptography on elliptic curves in a ...
Elliptic Curve Cryptography (ECC) is more and more used in public-key cryptosystems, especially beca...
Many applications require achieving high security level (confidentiality or integrity). My thesis is...
De nombreuses applications imposent des contraintes de sécurité élevées (notamment au sens confident...
Elliptic Curve Cryptography (ECC) has gained much importance in smart cards because of its higher sp...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
La Cryptographie sur les Courbes Elliptiques (abréviée ECC de l'anglais Elliptic Curve Cryptography)...
Elliptic curve based cryptosystems are nowadays increasingly used in protocols involving public-key ...
The protection of cryptographic mechanisms is an important challenge while developing a system of in...
Since their invention in the mid 1980s, Elliptic Curve Cryptosystems (ECC) have become an alternativ...
Les systèmes cryptographiques à base de courbes elliptiques sont aujourd'hui de plus en plus employé...
La cryptologie est un moyen de protéger la confidentialité, d'assurer l'intégrité, ou d'authentifier...
The emergence of embedded systems has enabled the development of wireless sensor networks indifferen...
This PhD thesis focuses on the study, the hardware design, the theoretical and practical validation,...
National audienceWe present our first results on the extension of computation accelerators designed ...
This thesis deals with issues related to the implementation of cryptography on elliptic curves in a ...
Elliptic Curve Cryptography (ECC) is more and more used in public-key cryptosystems, especially beca...