ISBN 978-1-4244-6965-9International audienceLaser-based fault injections are currently the most efficient technique that can be used to attack a secure system, since they have very high timing and location precision. Several papers have shown that a secret key may be recovered from ASICs and countermeasures have been proposed. But little research has been addressed at the specific case of secure protected implementations in SRAM-based FPGAs. This paper presents the results of laser-based fault injections on an architecture computing the AES encryption algorithm, protected by an error detection scheme, and implemented on a Virtex device. The results are compared to previous emulated fault injection campaigns and prove the criticality of remn...
With the increasing popularity of embedded systems, security and privacy concerns poses a huge threa...
This thesis focuses primarily on the evaluation of the functional effects of errors occurring in the...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
International audienceProgrammable devices are an interesting alternative when implementing embedded...
ISBN 978-1-4244-5833-2International audienceProgrammable devices like SRAM-based FPGAs, thanks to th...
ISBN : 978-2-84813-124-5International audienceThis paper summarizes the main types of attacks that c...
ISBN : 978-2-84813-136-8Security of digital processing is important in our society. Many application...
Nowadays, embedded systems and smart cards are part of everyday life. With the proliferation of thes...
International audienceNowadays, the security level of secure integrated circuits makes simple attack...
Fault injection attacks have been widely investigated in both academia and industry during the past ...
This paper demonstrates a Fault Attack on an AES core protected by an infection type countermeasure....
Abstract — Fault attacks are powerful and efficient cryptanalysis techniques to find the secret key ...
ISBN:978-0-7695-3598-2International audienceSRAM-based FPGAs are an appealing platform to implement ...
International audienceThe AES is a standard encryption algorithm used in numerous cryptographic syst...
Dans cette thèse, Nous présentons différents aspects d'attaques physiques sur les implémentations cr...
With the increasing popularity of embedded systems, security and privacy concerns poses a huge threa...
This thesis focuses primarily on the evaluation of the functional effects of errors occurring in the...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
International audienceProgrammable devices are an interesting alternative when implementing embedded...
ISBN 978-1-4244-5833-2International audienceProgrammable devices like SRAM-based FPGAs, thanks to th...
ISBN : 978-2-84813-124-5International audienceThis paper summarizes the main types of attacks that c...
ISBN : 978-2-84813-136-8Security of digital processing is important in our society. Many application...
Nowadays, embedded systems and smart cards are part of everyday life. With the proliferation of thes...
International audienceNowadays, the security level of secure integrated circuits makes simple attack...
Fault injection attacks have been widely investigated in both academia and industry during the past ...
This paper demonstrates a Fault Attack on an AES core protected by an infection type countermeasure....
Abstract — Fault attacks are powerful and efficient cryptanalysis techniques to find the secret key ...
ISBN:978-0-7695-3598-2International audienceSRAM-based FPGAs are an appealing platform to implement ...
International audienceThe AES is a standard encryption algorithm used in numerous cryptographic syst...
Dans cette thèse, Nous présentons différents aspects d'attaques physiques sur les implémentations cr...
With the increasing popularity of embedded systems, security and privacy concerns poses a huge threa...
This thesis focuses primarily on the evaluation of the functional effects of errors occurring in the...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...