Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected against them.Of course, malfunctioning protections are useless.Formal methods help to develop systems while assessing their conformity to a rigorous specification.The first goal of my thesis, and its innovative aspect, is to show that formal methods can be used to prove not only the principle of the countermeasures according to a model,but also their implementations, as it is where the physical vulnerabilities are exploited.My second goal is the proof and the automation of the protection techniques themselves, because handwritten security code is error-prone.Les implémentations cryptographiques sont vulnérables aux attaques physiques, et ont d...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
International audienceThe opening of the digital space extends security issues within this new space...
This thesis explores two different approaches to reduce the size of the public key cryptosystems bas...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Since the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun,...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
The main objective of this PhD thesis is to speedup elliptic curve cryptography (ECC) computations, ...
Fully homomorphic encryption is a kind of encryption offering the ability to manipulate encrypted da...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
International audienceThe opening of the digital space extends security issues within this new space...
This thesis explores two different approaches to reduce the size of the public key cryptosystems bas...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Since the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun,...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
The main objective of this PhD thesis is to speedup elliptic curve cryptography (ECC) computations, ...
Fully homomorphic encryption is a kind of encryption offering the ability to manipulate encrypted da...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
International audienceThe opening of the digital space extends security issues within this new space...
This thesis explores two different approaches to reduce the size of the public key cryptosystems bas...