Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Michel Agoyan"'
Autor:
Josep Balasch, Philippe Maurine, Michel Agoyan, Patrick Haddad, Vladimir Rozic, Dave Singelée, Bohan Yang, Maxime Madau, Ingrid Verbauwhede, Milos Grujic
Publikováno v:
IEEE International Workshop on Fault Diagnosis and Tolerance in Cryptography
FDTC: Fault Diagnosis and Tolerance in Cryptography
FDTC: Fault Diagnosis and Tolerance in Cryptography, Sep 2018, Amsterdam, Netherlands. pp.43-48, ⟨10.1109/FDTC.2018.00015⟩
FDTC
2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
FDTC: Fault Diagnosis and Tolerance in Cryptography
FDTC: Fault Diagnosis and Tolerance in Cryptography, Sep 2018, Amsterdam, Netherlands. pp.43-48, ⟨10.1109/FDTC.2018.00015⟩
FDTC
2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
© 2018 IEEE. Random number generation is a key function of today's secure devices. Commonly used for key generation, random number streams are more and more frequently used as the anchor of trust of several countermeasures such as masking. True Rand
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1fb8f1015374daeede3c1b6d1084d2ce
https://lirias.kuleuven.be/handle/123456789/648391
https://lirias.kuleuven.be/handle/123456789/648391
An {EM} Fault Injection Susceptibility Criterion and Its Application to the Localization of Hotspots
Publikováno v:
16th International Conference on Smart Card Research and Advanced Applications
CARDIS: Smart Card Research and Advanced Applications
CARDIS: Smart Card Research and Advanced Applications, Nov 2017, Lugano, Switzerland. pp.180-195, ⟨10.1007/978-3-319-75208-2_11⟩
Smart Card Research and Advanced Applications ISBN: 9783319752075
CARDIS
CARDIS: Smart Card Research and Advanced Applications
CARDIS: Smart Card Research and Advanced Applications, Nov 2017, Lugano, Switzerland. pp.180-195, ⟨10.1007/978-3-319-75208-2_11⟩
Smart Card Research and Advanced Applications ISBN: 9783319752075
CARDIS
International audience; Electromagnetic (EM) fault injection has been proven efficient in attacking targets such as system-on-chip (SoC) or smartcards. Nonetheless, security characterisations, performed either by certification laboratories or by firm
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ef65394e6de4f9e2637348c6a77581be
https://hal-lirmm.ccsd.cnrs.fr/lirmm-02100194
https://hal-lirmm.ccsd.cnrs.fr/lirmm-02100194
Autor:
Bruno Robisson, Patrick Soquet, Guillaume Phan, Michel Agoyan, Franck Wajsburt, Sébastien Le-Henaff, Pirouz Bazargan-Sabet
Publikováno v:
PROOFS: Security Proofs for Embedded Systems
PROOFS: Security Proofs for Embedded Systems, Sep 2015, Saint-Malo, France
Journal of Cryptographic Engineering
Journal of Cryptographic Engineering, Springer, 2016, ⟨10.1007/s13389-016-0143-4⟩
Journal of Cryptographic Engineering, 2016, ⟨10.1007/s13389-016-0143-4⟩
PROOFS: Security Proofs for Embedded Systems, Sep 2015, Saint-Malo, France
Journal of Cryptographic Engineering
Journal of Cryptographic Engineering, Springer, 2016, ⟨10.1007/s13389-016-0143-4⟩
Journal of Cryptographic Engineering, 2016, ⟨10.1007/s13389-016-0143-4⟩
Among other threats, secure components are subjected to physical attacks whose aim is to recover the secret information they store. Most of the work carried out to protect these components generally consists in developing protections (or countermeasu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::da7da6345b2139720ac5165a7a5cd93e
https://hal-emse.ccsd.cnrs.fr/emse-01232670/document
https://hal-emse.ccsd.cnrs.fr/emse-01232670/document
Publikováno v:
IEEE International Symposium on Hardware-Oriented Security and Trust
HOST: Hardware-Oriented Security and Trust
HOST: Hardware-Oriented Security and Trust, May 2014, Arlington, VA, United States. pp.97-100, ⟨10.1109/HST.2014.6855577⟩
HOST
HOST: Hardware-Oriented Security and Trust
HOST: Hardware-Oriented Security and Trust, May 2014, Arlington, VA, United States. pp.97-100, ⟨10.1109/HST.2014.6855577⟩
HOST
International audience; This paper introduces a leakage model in the frequency domain to enhance the efficiency of Side Channel Attacks of CMOS circuits. While usual techniques are focused on noise removal around clock harmonics, we show that the act
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c12d9c8260b0ea1e148d4f31a70f89e6
https://hal-lirmm.ccsd.cnrs.fr/lirmm-01096058
https://hal-lirmm.ccsd.cnrs.fr/lirmm-01096058
Publikováno v:
Cryptography and Security: From Theory to Applications
Cryptography and Security: From Theory to Applications, 2012, 6805, pp.248-264
Cryptography and Security: From Theory to Applications, 2012, pp.248-264
Cryptography and Security: From Theory to Applications ISBN: 9783642283673
Cryptography and Security
Cryptography and Security: From Theory to Applications, 2012, 6805, pp.248-264
Cryptography and Security: From Theory to Applications, 2012, pp.248-264
Cryptography and Security: From Theory to Applications ISBN: 9783642283673
Cryptography and Security
International audience; Along with the vast use of cryptography in security devices came the emergence of attacks like Electro-Magnetic analysis (EMA) where the measurement of the Electro-Magnetic (EM) waves radiated from an integrated circuit are us
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::57f0f3f0319c2399859ef795a8169652
https://hal-emse.ccsd.cnrs.fr/emse-00742768
https://hal-emse.ccsd.cnrs.fr/emse-00742768
Autor:
Assia Tria, Michel Agoyan, Bruno Robisson, Jacques Fournier, Laurent Freund, Driss Aboulkassimi
Publikováno v:
Proceedings of IEEE Intl. Workshop on Information Forensics and Security-WIFS'11
IEEE Intl. Workshop on Information Forensics and Security-WIFS'11
IEEE Intl. Workshop on Information Forensics and Security-WIFS'11, Nov 2011, Foz do Iguaçu, Brazil. Paper 75
WIFS
IEEE Intl. Workshop on Information Forensics and Security-WIFS'11
IEEE Intl. Workshop on Information Forensics and Security-WIFS'11, Nov 2011, Foz do Iguaçu, Brazil. Paper 75
WIFS
International audience; Smartphones, whose market share has increased by 54% between 2009 and 2010, is one of the favored platform for "Convergence Computing". Convergence Computing is a technology in which a single device can provide various service
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f943bb22b62fb580a95b6fbf3ed87756
https://hal-emse.ccsd.cnrs.fr/emse-00651026/file/PID2055323.pdf
https://hal-emse.ccsd.cnrs.fr/emse-00651026/file/PID2055323.pdf
Publikováno v:
Symposium on Hardware-Oriented Security and Trust (HOST 2011)
Symposium on Hardware-Oriented Security and Trust (HOST 2011), Jun 2011, San Diego, United States. pp.99-104, ⟨10.1109/HST.2011.5955004⟩
HOST
Symposium on Hardware-Oriented Security and Trust (HOST 2011), Jun 2011, San Diego, United States. pp.99-104, ⟨10.1109/HST.2011.5955004⟩
HOST
International audience; To ensure the code integrity in secure embedded processors, most previous works focus on detecting attacks without paying their attention to recovery. This paper proposes a novel hardware recovery approach allowing the process
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9293c5fce62ec9798136496e2db06a15
https://hal-emse.ccsd.cnrs.fr/emse-00620758
https://hal-emse.ccsd.cnrs.fr/emse-00620758
Autor:
Guillaume Phan, Franck Wajsburt, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Bruno Robisson, Pirouz Bazargan-Sabet
Publikováno v:
NTMS
NTMS 2011-4th IFIP International Conference on New Technologies, Mobility and Security
NTMS 2011-4th IFIP International Conference on New Technologies, Mobility and Security, Feb 2011, Paris, France. pp.1-5, ⟨10.1109/NTMS.2011.5721145⟩
NTMS 2011-4th IFIP International Conference on New Technologies, Mobility and Security
NTMS 2011-4th IFIP International Conference on New Technologies, Mobility and Security, Feb 2011, Paris, France. pp.1-5, ⟨10.1109/NTMS.2011.5721145⟩
International audience; Secure components are subject to physical attacks whose aim is to recover the secret information that they store. Most of works which aim to protect these components generally consist in developing protections (or countermeasu
Autor:
Assia Tria, Jean-Max Dutertre, Michel Agoyan, Amir-Pasha Mirbaha, Anne-Lise Ribotta, David Naccache
Publikováno v:
On-Line Testing Symposium (IOLTS), 2010 IEEE 16th International
On-Line Testing Symposium (IOLTS), 2010 IEEE 16th International, Jul 2010, Corfu, Greece. ⟨10.1109/IOLTS.2010.5560194⟩
IOLTS
On-Line Testing Symposium (IOLTS), 2010 IEEE 16th International, Jul 2010, Corfu, Greece. ⟨10.1109/IOLTS.2010.5560194⟩
IOLTS
International audience; This note describes laser fault experiments on an 8-bit 0.35µm microcontroller with no countermeasures. We show that reproducible single-bit faults, often considered unfeasible, can be obtained by careful beam-size and shot-i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b7cd22aab200da00a527d0cc496a7b18
https://hal-emse.ccsd.cnrs.fr/emse-01130826/document
https://hal-emse.ccsd.cnrs.fr/emse-01130826/document
Publikováno v:
Lecture Notes in Computer Science
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS)
Dieter Gollmann; Jean-Louis Lanet; Julien Iguchi-Cartigny. 9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. Springer, Lecture Notes in Computer Science, LNCS-6035, pp.182-193, 2010, Smart Card Research and Advanced Application. 〈10.1007/978-3-642-12510-2_13〉
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.182-193, ⟨10.1007/978-3-642-12510-2_13⟩
Lecture Notes in Computer Science ISBN: 9783642125096
CARDIS
9th IFIP WG 8.1/11.2 International conference, CARDIS 2010
9th IFIP WG 8.1/11.2 International conference, CARDIS 2010, Apr 2010, Passau, Germany. pp.182-193, ⟨10.1007/978-3-642-12510-2_13⟩
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS)
Dieter Gollmann; Jean-Louis Lanet; Julien Iguchi-Cartigny. 9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. Springer, Lecture Notes in Computer Science, LNCS-6035, pp.182-193, 2010, Smart Card Research and Advanced Application. 〈10.1007/978-3-642-12510-2_13〉
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.182-193, ⟨10.1007/978-3-642-12510-2_13⟩
Lecture Notes in Computer Science ISBN: 9783642125096
CARDIS
9th IFIP WG 8.1/11.2 International conference, CARDIS 2010
9th IFIP WG 8.1/11.2 International conference, CARDIS 2010, Apr 2010, Passau, Germany. pp.182-193, ⟨10.1007/978-3-642-12510-2_13⟩
International audience; Whilst clock fault attacks are known to be a serious security threat, an in-depth explanation of such faults still seems to be put in order. This work provides a theoretical analysis, backed by practical experiments, explainin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::01432242bf27c109d121d7bbb3f0c792
https://hal-emse.ccsd.cnrs.fr/emse-00505344
https://hal-emse.ccsd.cnrs.fr/emse-00505344