ISBN : 978-2-84813-136-8Security of digital processing is important in our society. Many applications require high levels of security and/or safety. To meet these requirements, applications often use ASIC components. The main problems of such devices are that they are dedicated to one application and require high production volumes. Another possible approach is to use reconfigurable platforms such as SRAM-based FPGAs. However, the configuration memory of such FPGAs is sensitive to perturbation, thus requiring a specific study. The main goal of this thesis is to characterize the fault injection effects obtained in such devices using lasers and power glitches. In this work, we analyze for a given FPGA the sensitivity of the elements configuri...
Fault injection attacks have been widely investigated in both academia and industry during the past ...
Dans cette thèse, Nous présentons différents aspects d'attaques physiques sur les implémentations cr...
New hardware cryptanalysis methods such as fault-based attacks have shown their efficiency to break ...
ISBN : 978-2-84813-136-8Security of digital processing is important in our society. Many application...
International audienceProgrammable devices are an interesting alternative when implementing embedded...
ISBN 978-1-4244-6965-9International audienceLaser-based fault injections are currently the most effi...
ISBN 978-1-4244-5833-2International audienceProgrammable devices like SRAM-based FPGAs, thanks to th...
This thesis deals primarily with the analysis of the functionaleffects of errors in the configuratio...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
ISBN : 978-2-84813-124-5International audienceThis paper summarizes the main types of attacks that c...
Nowadays, embedded systems and smart cards are part of everyday life. With the proliferation of thes...
This thesis focuses primarily on the evaluation of the functional effects of errors occurring in the...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
ISBN:978-0-7695-3598-2International audienceSRAM-based FPGAs are an appealing platform to implement ...
Cette thèse s'intéresse en premier lieu à l'analyse des effetsfonctionnels des erreurs dans laconfig...
Fault injection attacks have been widely investigated in both academia and industry during the past ...
Dans cette thèse, Nous présentons différents aspects d'attaques physiques sur les implémentations cr...
New hardware cryptanalysis methods such as fault-based attacks have shown their efficiency to break ...
ISBN : 978-2-84813-136-8Security of digital processing is important in our society. Many application...
International audienceProgrammable devices are an interesting alternative when implementing embedded...
ISBN 978-1-4244-6965-9International audienceLaser-based fault injections are currently the most effi...
ISBN 978-1-4244-5833-2International audienceProgrammable devices like SRAM-based FPGAs, thanks to th...
This thesis deals primarily with the analysis of the functionaleffects of errors in the configuratio...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
ISBN : 978-2-84813-124-5International audienceThis paper summarizes the main types of attacks that c...
Nowadays, embedded systems and smart cards are part of everyday life. With the proliferation of thes...
This thesis focuses primarily on the evaluation of the functional effects of errors occurring in the...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
ISBN:978-0-7695-3598-2International audienceSRAM-based FPGAs are an appealing platform to implement ...
Cette thèse s'intéresse en premier lieu à l'analyse des effetsfonctionnels des erreurs dans laconfig...
Fault injection attacks have been widely investigated in both academia and industry during the past ...
Dans cette thèse, Nous présentons différents aspects d'attaques physiques sur les implémentations cr...
New hardware cryptanalysis methods such as fault-based attacks have shown their efficiency to break ...