About
12
Publications
1,788
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
74
Citations
Introduction
Current institution
Additional affiliations
Publications
Publications (12)
In the context of side-channel countermeasures, threshold implementations (TI) have been introduced in 2006 by Nikova et al. to defeat attacks which exploit hardware effects called glitches. On several aspects, TI may be seen as an extension of another classical side-channel countermeasure, called masking, which is essentially based on the sharing...
In the context of side-channel countermeasures, threshold implementations (TI) have been introduced in 2006 by Nikova et al. to defeat attacks in presence of hardware effects called glitches. On several aspects, TI may be seen as an extension of another classical side-channel countermeasure, called masking, which is essentially based on the sharing...
Nowadays, horizontal or single-shot side-channel attacks against protected implementations of RSA and similar algorithms constitute a theoretic threat against secure devices. Nevertheless, in practice their application remains very difficult not only because of their complexity, but also because of environmental countermeasures integrated by design...
The security issues of devices, used in the Internet of Things (IoT) for example, can be considered in two contexts. On the one hand, these algorithms can be proven secure mathematically. On the other hand, physical attacks can weaken the implementation. In this work, we want to compare these attacks between them. A tool to evaluate and compare dif...
This paper presents a new side channel attack to recover a block cipher key. No plaintext and no ciphertext are required, no templates are built. Only the leakage measurements collected in many different rounds of the algorithm are exploited. The leakage is considered as a Hamming weight with a Gaussian noise. The chosen target is the Advanced Encr...
If the Signal to Noise Ratio (SNR) is a �gure of merit com-
monly used in many areas to gauge the quality of analogue measure-
ments, its use in the context of Side-Channel Attacks (SCA) remains
very di�cult because the nature and characteristics of the signals are
not a priori known. Consequently, the SNR is rarely used in this latter
area to gaug...
If the Signal to Noise Ratio (SNR) is a figure of merit com-
monly used in many areas to gauge the quality of analogue measure-
ments, its use in the context of Side-Channel Attacks (SCA) remains
very difficult because the nature and characteristics of the signals are
not a priori known. Consequently, the SNR is rarely used in this latter
area to g...
If the Signal to Noise Ratio (SNR) is a �gure of merit com-
monly used in many areas to gauge the quality of analogue measure-
ments, its use in the context of Side-Channel Attacks (SCA) remains
very di�cult because the nature and characteristics of the signals are
not a priori known. Consequently, the SNR is rarely used in this latter
area to gaug...
In this paper, we propose a generic method to assess the vulnerability to Differential Fault Analysis of generalized Feistel networks (GFN). This method is based on an in-depth analysis of the GFN properties. First the diffusion of faults is studied, both at the block level and at the S-box level, in order to have a fault which maximizes the number...
The Side Channel Analysis is now a classic way to retrieve a secret key in the smart-card world. Unfortunately, most of the ensuing attacks require the plaintext or the ciphertext used by the embedded algorithm. In this article, we present a new method for exploiting the leakage of a device without this constraint. Our attack is based on a study of...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the variation of device emanations to retrieve a secret key. These emanations can be the power consumption, the electromagnetic radiation, etc. Most of the time, those attacks use statistical methods to examine the relationship between the emanations and some...