Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Jessy Clédière"'
Publikováno v:
Workshop on Fault Detection and Tolerance in Cryptography (FDTC)
Workshop on Fault Detection and Tolerance in Cryptography (FDTC), Sep 2021, Milan, Italy. pp.31-38, ⟨10.1109/FDTC53659.2021.00014⟩
FDTC
Workshop on Fault Detection and Tolerance in Cryptography (FDTC), Sep 2021, Milan, Italy. pp.31-38, ⟨10.1109/FDTC53659.2021.00014⟩
FDTC
International audience; Recently, several Fault Attacks (FAs) which target modern Central Processing Units (CPUs) have emerged. These attacks are studied from a practical point of view and, due to the modern CPUs complexity, the underlying fault effe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::78c92ce0751ba335bfdd986ff5e14286
https://hal.science/hal-03382761/document
https://hal.science/hal-03382761/document
Autor:
Philippe Medina, Romain Wacquez, Eric Jalaguier, Edouard Deschaseaux, Christophe Plantier, Jessy Clédière, Stéphanie Anceau, Gilles Simon, Jacques Fournier, Jean Charbonnier, Stephan Borel
Publikováno v:
Additional Conferences (Device Packaging, HiTEC, HiTEN, and CICMT). 2017:1-15
Although the implementation of multiple countermeasures, both hardware and software, are making integrated circuits more and more secure, the backside of a chip is still considered as a vulnerability regarding physical attacks. A novel protection str
Publikováno v:
13th IFIP International Conference on Information Security Theory and Practice (WISTP)
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.123-138, ⟨10.1007/978-3-030-41702-4_8⟩
Information Security Theory and Practice ISBN: 9783030417017
WISTP
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.123-138, ⟨10.1007/978-3-030-41702-4_8⟩
Information Security Theory and Practice ISBN: 9783030417017
WISTP
International audience; Recently, several Fault Attacks (FAs) which target modern Central Processing Units (CPUs) have emerged. These attacks are studied from a practical point of view and, due to the modern CPUs complexity, the underlying fault effe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9f627ddbd7f4a6b9d7af3fd42a94ab71
https://hal.science/hal-03138010/document
https://hal.science/hal-03138010/document
Autor:
Jessy Clédière, Gilles Simon, Edouard Deschaseaux, L. Duperrex, Jean Charbonnier, Jean-Charles Souriau, A. Merle, Stephan Borel, Romain Wacquez, Jacques Fournier
Publikováno v:
2018 IEEE 68th Electronic Components and Technology Conference (ECTC)
2018 IEEE 68th Electronic Components and Technology Conference (ECTC), May 2018, San Diego, United States. pp.515-520, ⟨10.1109/ECTC.2018.00081⟩
2018 IEEE 68th Electronic Components and Technology Conference (ECTC), May 2018, San Diego, United States. pp.515-520, ⟨10.1109/ECTC.2018.00081⟩
International audience; A structure intended to protect Integrated Circuits (IC) against physical attacks is presented. Located on the backside of a chip, it complements the countermeasures usually available on the front side of secure components. It
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::09a5361672380fd802ea5d4f81fd17e0
https://hal-cea.archives-ouvertes.fr/cea-02185285/document
https://hal-cea.archives-ouvertes.fr/cea-02185285/document
Autor:
L. Maingault, Jean-luc Rainard, Jessy Clédière, Stéphanie Anceau, Rémi Tucoulou, Pierre Bleuet
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319667867
CHES
CHES
Synchrotron-based X-ray nanobeams are investigated as a tool to perturb microcontroller circuits. An intense hard X-ray focused beam of a few tens of nanometers is used to target the flash, EEPROM and RAM memory of a circuit. The obtained results sho
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7dab2ba27fba843209547bf85fe57b2e
https://doi.org/10.1007/978-3-319-66787-4_9
https://doi.org/10.1007/978-3-319-66787-4_9
Publikováno v:
Journal of Electronic Testing. 29:367-381
True Random Number Generators have many uses, in particular they play a key role in security applications and cryptographic algorithms. Our interest lies in the quality of their generated random numbers. More specifically, for such utilizations, a sl
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783319312705
CARDIS
CARDIS
We propose an end-to-end approach to evaluate the robustness of smartcard embedded applications against perturbation attacks. Key to this approach is the fault model inference phase, a method to determine a precise fault model according to the attack
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::109c599eaf6bc3546b8e9a092052a201
https://doi.org/10.1007/978-3-319-31271-2_7
https://doi.org/10.1007/978-3-319-31271-2_7
Autor:
Loic Zussa, Jean-Max Dutertre, Assia Tria, Jessy Clédière, Ingrid Exurville, Jean-Baptiste Rigaud, Bruno Robisson
Publikováno v:
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems
Second Workshop on Cryptography and Security in Computing Systems (CS2'2015)
Second Workshop on Cryptography and Security in Computing Systems (CS2'2015), Jan 2015, Amsterdam, Netherlands. pp.25, ⟨10.1145/2694805.2694810⟩
CS2@HiPEAC
Second Workshop on Cryptography and Security in Computing Systems (CS2'2015)
Second Workshop on Cryptography and Security in Computing Systems (CS2'2015), Jan 2015, Amsterdam, Netherlands. pp.25, ⟨10.1145/2694805.2694810⟩
CS2@HiPEAC
International audience; In this paper we study the information leakage that may exist, due to electrical coupling, between logically independent blocks of a secure circuit as a new attack path to retrieve secret information. First, an AES-128 has bee
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4876a1eb8da79ebca2a1fa57f5d81bb0
https://hal.archives-ouvertes.fr/hal-01855795/document
https://hal.archives-ouvertes.fr/hal-01855795/document
Publikováno v:
IEEE Int. Symposium on Hardware-Oriented Security and Trust (HOST)
IEEE Int. Symposium on Hardware-Oriented Security and Trust (HOST), May 2014, Arlington, France. ⟨10.1109/HST.2014.6855583⟩
HOST
IEEE Int. Symposium on Hardware-Oriented Security and Trust (HOST), May 2014, Arlington, France. ⟨10.1109/HST.2014.6855583⟩
HOST
International audience; Power supply underpowering and negative power supply glitches are commonly used for the purpose of injecting faults into secure circuits. The related fault injection mechanism has been extensively studied: it is based on setup
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::437b28c8d33ee068c463564f421b81ff
https://hal-emse.ccsd.cnrs.fr/emse-01099010/file/hal_HOST_2014_voltmeter.pdf
https://hal-emse.ccsd.cnrs.fr/emse-01099010/file/hal_HOST_2014_voltmeter.pdf
Publikováno v:
HOST
Today TRNGs are used in many different applications. The quality of their randomness is determined by these applications: for example those with security requirements need very good random numbers while simulations have fewer constraints on their pro