Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Rauzy, Pablo"'
Autor:
Rauzy, Pablo
Les implémentations cryptographiques sont vulnérables aux attaques physiques, et ont donc besoin d'en être protégées. Bien sûr, des protections défectueuses sont inutiles. L'utilisation des méthodes formelles permet de développer des systèm
Externí odkaz:
http://www.theses.fr/2015ENST0039/document
Autor:
Rivière, Lionel, Najm, Zakaria, Rauzy, Pablo, Danger, Jean-Luc, Bringer, Julien, Sauvage, Laurent
Hardware and software of secured embedded systems are prone to physical attacks. In particular, fault injection attacks revealed vulnerabilities on the data and the control flow allowing an attacker to break cryptographic or secured algorithms implem
Externí odkaz:
http://arxiv.org/abs/1510.01537
In his keynote speech at CHES 2004, Kocher advocated that side-channel attacks were an illustration that formal cryptography was not as secure as it was believed because some assumptions (e.g., no auxiliary information is available during the computa
Externí odkaz:
http://arxiv.org/abs/1506.05285
Autor:
Rauzy, Pablo, Guilley, Sylvain
In this paper we study the existing CRT-RSA countermeasures against fault-injection at-tacks. In an attempt to classify them we get to achieve deep understanding of how they work. We show that the many countermeasures that we study (and their variati
Externí odkaz:
http://arxiv.org/abs/1412.0600
Autor:
Rauzy, Pablo, Guilley, Sylvain
In this article, we describe a methodology that aims at either breaking or proving the security of CRT-RSA implementations against fault injection attacks. In the specific case-study of the BellCoRe attack, our work bridges a gap between formal proof
Externí odkaz:
http://arxiv.org/abs/1401.8170
Autor:
Rauzy, Pablo, Guilley, Sylvain
Publikováno v:
Program Protection and Reverse Engineering Workshop 2014, San Diego, CA : United States (2014)
In our paper at PROOFS 2013, we formally studied a few known countermeasures to protect CRT-RSA against the BellCoRe fault injection attack. However, we left Vigilant's countermeasure and its alleged repaired version by Coron et al. as future work, b
Externí odkaz:
http://arxiv.org/abs/1401.8172
Autor:
Rauzy, Pablo
« Une blockchain est un registre distribué et immuable dans lequel sont écrites des informations qui font consensus. » Dans cet article, nous commencerons par donner du sens à cette phrase et à l’ensemble des termes qui y sont employés, en n
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=openedition_::d1257b72e9fd4488ce207deede5ab152
http://journals.openedition.org/terminal/9059
http://journals.openedition.org/terminal/9059
Publikováno v:
PROOFS: Security Proofs for Embedded Systems 2016
PROOFS: Security Proofs for Embedded Systems 2016, Aug 2016, San, United States
Journal of Cryptographic Engineering
Journal of Cryptographic Engineering, Springer, 2017, vol. 7, nb. 4
PROOFS: Security Proofs for Embedded Systems 2016, Aug 2016, San, United States
Journal of Cryptographic Engineering
Journal of Cryptographic Engineering, Springer, 2017, vol. 7, nb. 4
International audience; Fault injection attacks are a real-world threat to cryptosystems, in particular asymmetric cryptography. In this paper, we focus on countermeasures which guarantee the integrity of the computation result, hence covering most e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::6864cd942ee107159ff50fe503a3377a
https://hal.archives-ouvertes.fr/hal-01362552/document
https://hal.archives-ouvertes.fr/hal-01362552/document
Publikováno v:
Cryptography and Coding ISBN: 9783642255151
IMA Int. Conf.
IMA Int. Conf.
Shape-memory alloys are metal pieces that "remember" their original cold-forged shapes and return to the pre-deformed shape after heating. In this work we construct a software analogous of shape-memory alloys: programs whose code resists obfuscation.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::71d525e590dbc2bb4be4357a20130f5d
https://zenodo.org/record/32155
https://zenodo.org/record/32155
Publikováno v:
Constructive Side-Channel Analysis & Secure Design: 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers; 2016, p111-129, 19p