Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Guillaume Bouffard"'
Autor:
Jean Dubreuil, Guillaume Bouffard
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783030973476
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7991df0c03002ec657795f406d4fdb8e
https://doi.org/10.1007/978-3-030-97348-3_15
https://doi.org/10.1007/978-3-030-97348-3_15
Autor:
Sébanjila Kevin Bukasa, Guillaume Bouffard, Mathieu Escouteloup, Ronan Lashermes, Thomas Trouchkine
Publikováno v:
Journal of Cryptographic Engineering
Journal of Cryptographic Engineering, Springer, 2021, 11 (4), pp.353--367. ⟨10.1007/s13389-021-00259-6⟩
Journal of Cryptographic Engineering, 2021, 11 (4), pp.353--367. ⟨10.1007/s13389-021-00259-6⟩
Journal of Cryptographic Engineering, Springer, 2021, 11 (4), pp.353--367. ⟨10.1007/s13389-021-00259-6⟩
Journal of Cryptographic Engineering, 2021, 11 (4), pp.353--367. ⟨10.1007/s13389-021-00259-6⟩
International audience; The last years have seen the emergence of fault attacks targeting modern central processing units (CPUs). These attacks are analyzed at a very high abstraction level and, due to the modern CPUs complexity, the underlying fault
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::894cc060035695d87ec1b37bf5059323
https://hal.archives-ouvertes.fr/hal-03175704/document
https://hal.archives-ouvertes.fr/hal-03175704/document
Publikováno v:
Workshop on Fault Detection and Tolerance in Cryptography (FDTC)
Workshop on Fault Detection and Tolerance in Cryptography (FDTC), Sep 2021, Milan, Italy. pp.31-38, ⟨10.1109/FDTC53659.2021.00014⟩
FDTC
Workshop on Fault Detection and Tolerance in Cryptography (FDTC), Sep 2021, Milan, Italy. pp.31-38, ⟨10.1109/FDTC53659.2021.00014⟩
FDTC
International audience; Recently, several Fault Attacks (FAs) which target modern Central Processing Units (CPUs) have emerged. These attacks are studied from a practical point of view and, due to the modern CPUs complexity, the underlying fault effe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::78c92ce0751ba335bfdd986ff5e14286
https://hal.science/hal-03382761/document
https://hal.science/hal-03382761/document
Publikováno v:
13th IFIP International Conference on Information Security Theory and Practice (WISTP)
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.123-138, ⟨10.1007/978-3-030-41702-4_8⟩
Information Security Theory and Practice ISBN: 9783030417017
WISTP
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.123-138, ⟨10.1007/978-3-030-41702-4_8⟩
Information Security Theory and Practice ISBN: 9783030417017
WISTP
International audience; Recently, several Fault Attacks (FAs) which target modern Central Processing Units (CPUs) have emerged. These attacks are studied from a practical point of view and, due to the modern CPUs complexity, the underlying fault effe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9f627ddbd7f4a6b9d7af3fd42a94ab71
https://hal.science/hal-03138010/document
https://hal.science/hal-03138010/document
Autor:
Guillaume Bouffard, Jean-Louis Lanet
Publikováno v:
Computers and Security
Computers and Security, Elsevier, 2015, 50, pp.33-46. ⟨10.1016/j.cose.2015.01.004⟩
Computers and Security, 2015, 50, pp.33-46. ⟨10.1016/j.cose.2015.01.004⟩
Computers and Security, Elsevier, 2015, 50, pp.33-46. ⟨10.1016/j.cose.2015.01.004⟩
Computers and Security, 2015, 50, pp.33-46. ⟨10.1016/j.cose.2015.01.004⟩
International audience; Recently, researchers published several attacks on smart cards. Among these, software attacks are the most affordable, they do not require specific hardware (laser, EM probe, etc.). Such attacks succeed to modify a sensitive s
Publikováno v:
International Journal of Secure Software Engineering
International Journal of Secure Software Engineering, 2013, 4 (2), pp.19-39. ⟨10.4018/jsse.2013040102⟩
International Journal of Secure Software Engineering, 2013, 4 (2), pp.19-39. ⟨10.4018/jsse.2013040102⟩
One of the challenges for smart card deployment is the security interoperability. A smart card resistant to an attack on a given platform should be able to guarantee the same behavior on another platform. But the current implementations do not comply
Publikováno v:
Journal of Cryptographic Engineering
Journal of Cryptographic Engineering, Springer, 2016, ⟨10.1007/s13389-016-0142-5⟩
Journal of Cryptographic Engineering, 2016, ⟨10.1007/s13389-016-0142-5⟩
Journal of Cryptographic Engineering, Springer, 2016, ⟨10.1007/s13389-016-0142-5⟩
Journal of Cryptographic Engineering, 2016, ⟨10.1007/s13389-016-0142-5⟩
International audience; Retrieving assets inside a secure element is a challenging task. The most attractive assets are the cryptographic keys stored into the non volatile memory (NVM) area. Most of the researches try to obtain them through side chan
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::dbccbc813a3eb9b90aa84ad7bdd09656
https://hal.inria.fr/hal-01405463
https://hal.inria.fr/hal-01405463
Autor:
Julien Lancia, Guillaume Bouffard
Publikováno v:
Smart Card Research and Advanced Applications-14th International Conference, CARDIS 2015
Smart Card Research and Advanced Applications-14th International Conference, CARDIS 2015, Nov 2015, Bochum, Germany. pp.75-88, ⟨10.1007/978-3-319-31271-2_5⟩
Smart Card Research and Advanced Applications ISBN: 9783319312705
CARDIS
Smart Card Research and Advanced Applications-14th International Conference, CARDIS 2015, Nov 2015, Bochum, Germany. pp.75-88, ⟨10.1007/978-3-319-31271-2_5⟩
Smart Card Research and Advanced Applications ISBN: 9783319312705
CARDIS
International audience; The Byte Code Verifier (BCV) is one of the most important security element in the Java Card environment. Indeed, embedded applets must be verified prior installation to prevent ill-formed applet loading. In this article, we di
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::53d593971644a99bfbdb9d82101bbbf9
https://hal.archives-ouvertes.fr/hal-03138832/document
https://hal.archives-ouvertes.fr/hal-03138832/document
Autor:
Ranim Chakra, Jean-Louis Lanet, Afef Mestiri, Rokia Lamrani, Abdellatif Fandi, Guillaume Bouffard, Mohammed Monsif
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783319167626
CARDIS
Cardis 2014-13th International Conference Smart Card Research and Advanced Application Conference
Cardis 2014-13th International Conference Smart Card Research and Advanced Application Conference, CNAM, Nov 2014, Paris, France. pp.3-17, ⟨10.1007/978-3-319-16763-3_1⟩
CARDIS
Cardis 2014-13th International Conference Smart Card Research and Advanced Application Conference
Cardis 2014-13th International Conference Smart Card Research and Advanced Application Conference, CNAM, Nov 2014, Paris, France. pp.3-17, ⟨10.1007/978-3-319-16763-3_1⟩
International audience; Nowadays several papers have shown the ability to dump the EEPROM area of several Java Cards leading to the disclosure of already loaded applet and data structure of the card. Such a reverse engineering process is costly and p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::df6c84b98699bbeb065763801396e950
https://doi.org/10.1007/978-3-319-16763-3_1
https://doi.org/10.1007/978-3-319-16763-3_1
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783319167626
CARDIS
CARDIS
Several logical attacks against Java based smart card have been published recently. Most of them are based on the hypothesis that the type verification was not performed, thus allowing to obtain dynamically a type confusion. To mitigate such attacks,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a9ff31f0e76fa9eddff7c7845c87ec27
https://doi.org/10.1007/978-3-319-16763-3_2
https://doi.org/10.1007/978-3-319-16763-3_2