Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Nidhal Selmane"'
Publikováno v:
HOST
Cryptographic implementations are vulnerable to physical attacks. Many countermeasures to resist them have been proposed in the past. However, they are all specific to a given attacker and allow to mitigate the risk only up to a certain level: improv
Publikováno v:
WESS
Wave Dynamic Differential Logic (WDDL) is a hiding countermeasure to thrawt side channel attacks (SCA). It suffers from a vulnerability called Early Evaluation, i.e. calculating output before all inputs are valid. This causes delay biases in WDDL eve
Publikováno v:
FDTC
Fault Diagnosis and Tolerance in Cryptography
Fault Diagnosis and Tolerance in Cryptography, Aug 2010, Santa Barbara, United States. pp.51-65, ⟨10.1109/FDTC.2010.15⟩
Fault Diagnosis and Tolerance in Cryptography
Fault Diagnosis and Tolerance in Cryptography, Aug 2010, Santa Barbara, United States. pp.51-65, ⟨10.1109/FDTC.2010.15⟩
Fault injections constitute a major threat to the security of embedded systems. Errors occurring in the cryptographic algorithms have been shown to be extremely dangerous, since powerful attacks can exploit few of them to recover the full secrets. Mo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9821e75fd65b6de6d479c8f9d4347271
https://hal.archives-ouvertes.fr/hal-00482194
https://hal.archives-ouvertes.fr/hal-00482194
Autor:
Florent Flament, Jean-Luc Danger, Maxime Nassar, Tarik Graba, Shivam Bhasin, Yves Mathieu, Laurent Sauvage, Sylvain Guilley, Nidhal Selmane
Publikováno v:
International Conference on ReConFigurable Computing and FPGAs
ReConFig
ReConFig, Dec 2009, Cancún, Mexico. pp.213-218, ⟨10.1109/ReConFig.2009.50⟩
ReConFig
ReConFig, Dec 2009, Cancún, Mexico. pp.213-218, ⟨10.1109/ReConFig.2009.50⟩
The main challenge when implementing cryptographic algorithms in hardware is to protect them against attacks that target directly the device. Two strategies are customarily employed by malevolent adversaries: observation and differential perturbation
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::61f19f816069061c5bcaeecfae888a52
https://hal.archives-ouvertes.fr/hal-00411843v3/document
https://hal.archives-ouvertes.fr/hal-00411843v3/document
Publikováno v:
FDTC
CHES
CHES, Sep 2009, Lausanne, Switzerland. pp.73-83, ⟨10.1109/FDTC.2009.40⟩
CHES
CHES, Sep 2009, Lausanne, Switzerland. pp.73-83, ⟨10.1109/FDTC.2009.40⟩
73-83; International audience; In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful tool to break some implementations of robus
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3a6a3dee2632611fb79b9f19a67c0396
https://hal.archives-ouvertes.fr/hal-00410135
https://hal.archives-ouvertes.fr/hal-00410135
Publikováno v:
HOST
Security evaluation of various AES implementation against practical power attacks has been reported in literature. However, to the authors' knowledge, very few of the fault attacks reported on AES have been practically realized. Since sbox is a cruci
Publikováno v:
NTMS
Hardware implementation of cryptographic algorithms are widely used to secure wireless networks. They guarantee good security performance at low processing and energy costs. However, unlike traditional implementations, they are vulnerable to side cha
Publikováno v:
FDTC, 5th workshop on Fault Tolerance and Detection in Cryptography
FDTC
FDTC, Aug 2008, Washington, DC, United States. pp.3-17, ⟨10.1109/FDTC.2008.18⟩
FDTC
FDTC, Aug 2008, Washington, DC, United States. pp.3-17, ⟨10.1109/FDTC.2008.18⟩
17 pages. Slides availables from: http://conferenze.dei.polimi.it/FDTC08/slides.htm; International audience; This article presents a family of cryptographic ASICs, called SecMat, designed in CMOS 130 nanometer technology by the authors with the help
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3f649e9207fd80bbf6b9257af8be7a6f
https://hal.archives-ouvertes.fr/hal-00311431/document
https://hal.archives-ouvertes.fr/hal-00311431/document
Publikováno v:
EDCC
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES and DES. Various methods of faults attack on cryptographic systems have been discovered and researched. However, to the authors' knowledge
Publikováno v:
Information Security, IET
Information Security, IET, 2011, 5 (4), pp.181-190. ⟨10.1049/iet-ifs.2010.0238⟩
Information Security, IET, 2011, 5 (4), pp.181-190. ⟨10.1049/iet-ifs.2010.0238⟩
Fault attacks are real threats against hardware implementations of robust cryptographic algorithms such as advanced encryption standard (AES). The authors present an active non-invasive attack to inject faults during the execution of the algorithm an