This master thesis aims at securing cryptographic devices against two common types of attacks: side-channel attacks and fault attacks, using algorithmic methods. This work presents some state-of-art techniques to protect AES implementations against these attacks separately, studies the performance of selected schemes and exposes a weakness in modern algorithmic fault countermeasures used for SP networks. Furthermore, it proposes two ways to protect against those attacks simultaneously and confirms that the costs of these solutions do not introduce higher complexity with respect to the order of protection. For all the implementations, costs were evaluated in terms of execution time and memory costs and the combined solutions were compared to...
Redundancy based countermeasures against fault attacks are a popular choice in security-critical com...
Abstract. A protection circuit can be added into cryptographic systems to detect both soft errors an...
Side-Channel Analysis (SCA) and Fault Attacks (FA) are techniques to recover sensitive information i...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Part 2: Invasive AttacksInternational audienceThe contribution of this paper is twofold: (1) a novel...
Dans cette thèse, Nous présentons différents aspects d'attaques physiques sur les implémentations cr...
International audienceIn critical communication infrastructures, hardware accelerators are often use...
Les blocs cryptographiques utilisés dans les circuits intégrés implémentent des algorithmes prouvés ...
Side-channel adversaries represent real-world threats against (certified and uncertified) cryptograp...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
International audienceIn 2011, Li presented clockwise collision analysis on nonprotected Advanced En...
Cryptography algorithms, such as Advanced Encryption Standard (AES) algorithm, are responsible for k...
The implementation of cryptographic algorithms must be protected against physical attacks. Side-chan...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
In the attacker models of Side-Channel Attacks (SCA) and Fault Injection Attacks (FIA), the opponent...
Redundancy based countermeasures against fault attacks are a popular choice in security-critical com...
Abstract. A protection circuit can be added into cryptographic systems to detect both soft errors an...
Side-Channel Analysis (SCA) and Fault Attacks (FA) are techniques to recover sensitive information i...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Part 2: Invasive AttacksInternational audienceThe contribution of this paper is twofold: (1) a novel...
Dans cette thèse, Nous présentons différents aspects d'attaques physiques sur les implémentations cr...
International audienceIn critical communication infrastructures, hardware accelerators are often use...
Les blocs cryptographiques utilisés dans les circuits intégrés implémentent des algorithmes prouvés ...
Side-channel adversaries represent real-world threats against (certified and uncertified) cryptograp...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
International audienceIn 2011, Li presented clockwise collision analysis on nonprotected Advanced En...
Cryptography algorithms, such as Advanced Encryption Standard (AES) algorithm, are responsible for k...
The implementation of cryptographic algorithms must be protected against physical attacks. Side-chan...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
In the attacker models of Side-Channel Attacks (SCA) and Fault Injection Attacks (FIA), the opponent...
Redundancy based countermeasures against fault attacks are a popular choice in security-critical com...
Abstract. A protection circuit can be added into cryptographic systems to detect both soft errors an...
Side-Channel Analysis (SCA) and Fault Attacks (FA) are techniques to recover sensitive information i...