Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Jacques J. A. Fournier"'
Publikováno v:
DSD 2020-23rd Euromicro Conference on Digital System Design
DSD 2020-23rd Euromicro Conference on Digital System Design, Aug 2020, Kranj (virtual conference), Slovenia. pp.185-192, ⟨10.1109/DSD51259.2020.00039⟩
DSD
DSD 2020-23rd Euromicro Conference on Digital System Design, Aug 2020, Kranj (virtual conference), Slovenia. pp.185-192, ⟨10.1109/DSD51259.2020.00039⟩
DSD
International audience; With the Internet of Things (IoT) an increasing amount of sensitive data have to be communicated and hence encrypted. Low-cost hardware attacks such as fault analysis (FA) or side-channel analysis (SCA) threaten the implementa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f367682d0dcdaadbb72bd18350eb82ee
https://hal-cea.archives-ouvertes.fr/cea-03510418
https://hal-cea.archives-ouvertes.fr/cea-03510418
Publikováno v:
IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Dec 2020, Virtual Event, United States
HOST
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Dec 2020, Virtual Event, United States
HOST
International audience; This paper introduces a new profiling attack that targets elliptic curves-based cryptographic implementations. This attack exploits leakages from the conditional swap operation used in implementations using the Montgomery Ladd
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3a9825c79f8862a07374728bcff3eaed
https://hal-cea.archives-ouvertes.fr/cea-03157323
https://hal-cea.archives-ouvertes.fr/cea-03157323
Publikováno v:
Journal of Cryptographic Engineering
Journal of Cryptographic Engineering, inPress, ⟨10.1007/s13389-018-00201-3⟩
Journal of Cryptographic Engineering, Springer, In press, ⟨10.1007/s13389-018-00201-3⟩
Journal of Cryptographic Engineering, inPress, ⟨10.1007/s13389-018-00201-3⟩
Journal of Cryptographic Engineering, Springer, In press, ⟨10.1007/s13389-018-00201-3⟩
Although the vulnerability of pairing-based algorithms to side-channel attacks has been demonstrated—pairing implementations were targeted on three different devices in a recent paper [41]—it nevertheless remains difficult to choose an adapted le
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d0e7e3064c710de5890dff7b07915825
https://hal.science/hal-02068387/file/JCEN_2018.pdf
https://hal.science/hal-02068387/file/JCEN_2018.pdf
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030121457
ICISC
21th International Conference on Information Security and Cryptology (ICISC 2018)
21th International Conference on Information Security and Cryptology (ICISC 2018), Nov 2018, Séoul, South Korea
ICISC
21th International Conference on Information Security and Cryptology (ICISC 2018)
21th International Conference on Information Security and Cryptology (ICISC 2018), Nov 2018, Séoul, South Korea
The authenticated cipher ACORN is one of the two finalists of the CAESAR competition and is intended for lightweight applications. Because such use cases require protection against physical attacks, several works have been undertaken to achieve secur
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::24ab21d1fad0b9c1d98538e977f213e8
https://doi.org/10.1007/978-3-030-12146-4_20
https://doi.org/10.1007/978-3-030-12146-4_20
Publikováno v:
11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'18)
11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'18), Jun 2018, Stockholm, Sweden. ⟨10.1145/3212480.3212488⟩
WISEC
11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'18), Jun 2018, Stockholm, Sweden. ⟨10.1145/3212480.3212488⟩
WISEC
ISBN: 978-1-4503-5731-9; International audience; Wake-up radios are mechanisms that control the sleep and active modes of energy-constrained Internet of Things (IoT) nodes. These radios detect predetermined wake-up tokens and switch the devices to an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6d1c14a18eae54f6098ff028f4161c4b
https://hal-cea.archives-ouvertes.fr/cea-01922847
https://hal-cea.archives-ouvertes.fr/cea-01922847
Publikováno v:
CNS
Because major smartphone platforms are equipped with Bluetooth Low Energy (BLE) capabilities, more and more smart devices have adopted BLE technologies to communicate with smartphones. In order to support the mesh topology in BLE networks, several pr
Publikováno v:
ISCAS
ISCAS 2018-IEEE International Symposium on Circuits and Systems
ISCAS 2018-IEEE International Symposium on Circuits and Systems, May 2018, Florence, Italy. pp.1-5, ⟨10.1109/ISCAS.2018.8351693⟩
ISCAS 2018-IEEE International Symposium on Circuits and Systems
ISCAS 2018-IEEE International Symposium on Circuits and Systems, May 2018, Florence, Italy. pp.1-5, ⟨10.1109/ISCAS.2018.8351693⟩
International audience; A growing number of connected objects, with their high performance and low-resources constraints, are embedding lightweight ciphers for protecting the confidentiality of the data they manipulate or store. Since those objects a
Publikováno v:
IndoCrypt 2017
IndoCrypt 2017, Dec 2017, Chennai, India
Lecture Notes in Computer Science ISBN: 9783319716664
INDOCRYPT
IndoCrypt 2017, Dec 2017, Chennai, India
Lecture Notes in Computer Science ISBN: 9783319716664
INDOCRYPT
ChaCha is a family of stream ciphers that are very efficient on constrainted platforms. In this paper, we present electromagnetic side-channel analyses for two different software implementations of ChaCha20 on a 32-bit architecture: one compiled and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::73537adeda6db189be46691392c47dcf
https://hal.science/hal-01712688
https://hal.science/hal-01712688
Publikováno v:
Cryptography and Communications-Discrete Structures, Boolean Functions and Sequences
Cryptography and Communications-Discrete Structures, Boolean Functions and Sequences, 2015, 7 (1), pp.185--205. ⟨10.1007/s12095-014-0114-5⟩
Cryptography and Communications-Discrete Structures, Boolean Functions and Sequences, Springer, 2015, 7 (1), pp.185--205. ⟨10.1007/s12095-014-0114-5⟩
Cryptography and Communications-Discrete Structures, Boolean Functions and Sequences, 2015, 7 (1), pp.185--205. ⟨10.1007/s12095-014-0114-5⟩
Cryptography and Communications-Discrete Structures, Boolean Functions and Sequences, Springer, 2015, 7 (1), pp.185--205. ⟨10.1007/s12095-014-0114-5⟩
International audience; The latest implementations of pairings allow efficient schemes for Pairing Based Cryptography. These make the use of pairings suitable for small and constrained devices (smart phones, smart cards{\ldots}) in addition to more p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8485f91baca9915593e89bea739ffb62
https://hal.science/hal-01579820
https://hal.science/hal-01579820
Autor:
MONTOYA, Maxime
Publikováno v:
Autre. Université de Lyon, 2019. Français. ⟨NNT : 2019LYSEM032⟩
The goal of this work is to propose new methods that provide both a high security and a high energy efficiency for integrated circuits for the IoT.On the one side, we study the security of a mechanism dedicated to energy management. Wake-up radios tr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2592::925455af7084c33904a674430af24aee
https://tel.archives-ouvertes.fr/tel-02966640/document
https://tel.archives-ouvertes.fr/tel-02966640/document