The cryptographic blocks used in the integrated circuits implement algorithms proved robust against cryptanalysis. However, malicious manipulation against the circuit itself can retrieve the secret data. Among known hardware attacks, attacks called "fault attacks" are proved particularly effective. Their principle is to inject a fault in the circuit (using for example a laser beam) that will produce an erroneous result and to compare it with a correct result. Therefore, it is essential to detect these errors during the circuit running. The work presented in this thesis concerns the concurrent detection of errors in cryptographic circuits, using as support the implementation of the Advanced Encryption Standard "AES". Thus, we analyze several...
International audienceWhen designing circuits for security-related applications, the robustness depe...
International audienceThe secret keys manipulated by cryptographic circuits can be extracted using f...
International audienceIn critical communication infrastructures, hardware accelerators are often use...
Les blocs cryptographiques utilisés dans les circuits intégrés implémentent des algorithmes prouvés ...
New hardware cryptanalysis methods such as fault-based attacks have shown their efficiency to break ...
The cryptographic circuits, because they contain confidential information, are subject to fraudulent...
Microelectronic security devices are more and more present in our lives (smartcards, SIM cards) and ...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
Nowadays, embedded systems and smart cards are part of everyday life. With the proliferation of thes...
Dans cette thèse, Nous présentons différents aspects d'attaques physiques sur les implémentations cr...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
Les circuits cryptographiques, parce qu'ils contiennent des informations confidentielles, font l'obj...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
Les circuits cryptographiques, parce qu'ils contiennent des informations confidentielles, font l'obj...
Les travaux présentés concernent l'exploration des techniques de localisation utilisées en analyse d...
International audienceWhen designing circuits for security-related applications, the robustness depe...
International audienceThe secret keys manipulated by cryptographic circuits can be extracted using f...
International audienceIn critical communication infrastructures, hardware accelerators are often use...
Les blocs cryptographiques utilisés dans les circuits intégrés implémentent des algorithmes prouvés ...
New hardware cryptanalysis methods such as fault-based attacks have shown their efficiency to break ...
The cryptographic circuits, because they contain confidential information, are subject to fraudulent...
Microelectronic security devices are more and more present in our lives (smartcards, SIM cards) and ...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
Nowadays, embedded systems and smart cards are part of everyday life. With the proliferation of thes...
Dans cette thèse, Nous présentons différents aspects d'attaques physiques sur les implémentations cr...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
Les circuits cryptographiques, parce qu'ils contiennent des informations confidentielles, font l'obj...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
Les circuits cryptographiques, parce qu'ils contiennent des informations confidentielles, font l'obj...
Les travaux présentés concernent l'exploration des techniques de localisation utilisées en analyse d...
International audienceWhen designing circuits for security-related applications, the robustness depe...
International audienceThe secret keys manipulated by cryptographic circuits can be extracted using f...
International audienceIn critical communication infrastructures, hardware accelerators are often use...