Zobrazeno 1 - 10
of 38
pro vyhledávání: '"Clavier, Christophe"'
In 1973, Neil Sloane published a very short paper introducing an intriguing problem: Pick a decimal integer $n$ and multiply all its digits by each other. Repeat the process until a single digit $\Delta(n)$ is obtained. $\Delta(n)$ is called the \tex
Externí odkaz:
http://arxiv.org/abs/2110.04263
Publikováno v:
In Microprocessors and Microsystems September 2023 101
Autor:
Houssein Meraneh, Awaleh, Clavier, Christophe, Le Bouder, Hélène, Maillard, Julien, Thomas, Gaël
Publikováno v:
SECRYPT 2022
SECRYPT 2022, 2022, Lisbonne, Portugal
SECRYPT 2022, 2022, Lisbonne, Portugal
International audience; Elephant is a finalist to the NIST lightweight cryptography competition. In this paper, the first theoretical blind side channel attack against the authenticated encryption algorithm Elephant is presented. More precisely, we a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::60f6ec39c77ee8e523bd7f0468962666
https://hal.science/hal-03672917/document
https://hal.science/hal-03672917/document
Autor:
Clavier, Christophe, Reynaud, Léo
Publikováno v:
[Research Report] 2019/1379, IACR Cryptology ePrint Archive. 2019
Obtaining compact, while cryptographically strong, S-boxes is a challenging task required for hardware implementations of lightweight cryptography. Contrarily to 4-bit permutations design which is somewhat well understood, 8-bit permutations have mai
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::f6857b3fb935886888d5d439395518b9
https://hal.archives-ouvertes.fr/hal-02486894/file/2019-1379.pdf
https://hal.archives-ouvertes.fr/hal-02486894/file/2019-1379.pdf
Publikováno v:
[Research Report] IACR Cryptology ePrint Archive. 2019
SM3, the Chinese standard hash algorithm inspired from SHA2, can be attacker by similar means than SHA2 up to an adaptation to its differences. But this kind of attack is based on targeting point of interest of different kinds, some are end of comput
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::b1e6752e92f4f4ef630cd3d5affa6a77
https://hal.archives-ouvertes.fr/hal-02486888/file/2019-346.pdf
https://hal.archives-ouvertes.fr/hal-02486888/file/2019-346.pdf
Publikováno v:
[Research Report] 2017/706, IACR Cryptology ePrint Archive. 2017
Side-channel techniques have well progressed over the last few years, leading to the creation of a variety of statistical tools for extracting the secrets used in cryptographic algorithms. Such techniques are taking advantage of the side-channel trac
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::0892aa904b7adcda329ee752e69abf6c
https://hal.archives-ouvertes.fr/hal-02486924
https://hal.archives-ouvertes.fr/hal-02486924
Publikováno v:
[Research Report] 2015/877, IACR Cryptology ePrint Archive. 2015
In this paper we study a parity check based countermeasure proposed by Chen et al. that thwarts their attack by detecting byte fault injection during the AES key schedule process. We provide a generalization of their approach that allows to derive pa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::ea2a6ecbd48e33ccda38d500c519f8a3
https://hal.archives-ouvertes.fr/hal-02486939/document
https://hal.archives-ouvertes.fr/hal-02486939/document
Autor:
Clavier, Christophe
Publikováno v:
Cryptographie et sécurité [cs.CR]. Université de Versailles Saint-Quentin-en-Yvelines, 2007. Français
In a world full of threats, the development of widespread digital applications has led to the need for a practical device containing cryptographic functions that provide the everyday needs for secure transactions, confidentiality of communications, i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::b54070d51a827c239f735689165e49f6
https://hal.archives-ouvertes.fr/tel-02487098
https://hal.archives-ouvertes.fr/tel-02487098
Publikováno v:
2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Aug 2010, Santa Barbara, France. pp.10-19, ⟨10.1109/FDTC.2010.17⟩
2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Aug 2010, Santa Barbara, France. pp.10-19, ⟨10.1109/FDTC.2010.17⟩
International audience
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cefd862d1fe1c049d286ecd901848362
https://hal.archives-ouvertes.fr/hal-02486972
https://hal.archives-ouvertes.fr/hal-02486972
Autor:
Bresson, Emmanuel, Canteaut, Anne, Chevallier-Mames, Benoit, Clavier, Christophe, Fuhr, Thomas, Gouget, Aline, Icart, Thomas, Misarsky, Jean-Francois, Naya-Plasencia, Maria, Paillier, Pascal, Pornin, Thomas, Reinhard, Jean-Rene, Thuillet, Celine, Videau, Marion
Publikováno v:
[Research Report] 2009/299, IACR Cryptology ePrint Archive. 2009
Shabal is based on a new provably secure mode of operation. Some related-key distinguishers for the underlying keyed permutation have been exhibited recently by Aumasson et al. and Knudsen et al., but with no visible impact on the security of Shabal.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::df2872394c09b815ac9729193629a0c5
https://inria.hal.science/hal-00771272
https://inria.hal.science/hal-00771272