Linge Yanis

Linge Yanis
Verified
Linge verified their affiliation via an institutional email.
Verified
Linge verified their affiliation via an institutional email.
  • Doctor of Philosophy
  • security expert at STMicroelectronics

About

12
Publications
1,788
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
74
Citations
Current institution
STMicroelectronics
Current position
  • security expert
Additional affiliations

Publications

Publications (12)
Article
Full-text available
In the context of side-channel countermeasures, threshold implementations (TI) have been introduced in 2006 by Nikova et al. to defeat attacks which exploit hardware effects called glitches. On several aspects, TI may be seen as an extension of another classical side-channel countermeasure, called masking, which is essentially based on the sharing...
Chapter
Full-text available
In the context of side-channel countermeasures, threshold implementations (TI) have been introduced in 2006 by Nikova et al. to defeat attacks in presence of hardware effects called glitches. On several aspects, TI may be seen as an extension of another classical side-channel countermeasure, called masking, which is essentially based on the sharing...
Article
Full-text available
Nowadays, horizontal or single-shot side-channel attacks against protected implementations of RSA and similar algorithms constitute a theoretic threat against secure devices. Nevertheless, in practice their application remains very difficult not only because of their complexity, but also because of environmental countermeasures integrated by design...
Chapter
The security issues of devices, used in the Internet of Things (IoT) for example, can be considered in two contexts. On the one hand, these algorithms can be proven secure mathematically. On the other hand, physical attacks can weaken the implementation. In this work, we want to compare these attacks between them. A tool to evaluate and compare dif...
Conference Paper
This paper presents a new side channel attack to recover a block cipher key. No plaintext and no ciphertext are required, no templates are built. Only the leakage measurements collected in many different rounds of the algorithm are exploited. The leakage is considered as a Hamming weight with a Gaussian noise. The chosen target is the Advanced Encr...
Conference Paper
Full-text available
If the Signal to Noise Ratio (SNR) is a �gure of merit com- monly used in many areas to gauge the quality of analogue measure- ments, its use in the context of Side-Channel Attacks (SCA) remains very di�cult because the nature and characteristics of the signals are not a priori known. Consequently, the SNR is rarely used in this latter area to gaug...
Conference Paper
Full-text available
If the Signal to Noise Ratio (SNR) is a figure of merit com- monly used in many areas to gauge the quality of analogue measure- ments, its use in the context of Side-Channel Attacks (SCA) remains very difficult because the nature and characteristics of the signals are not a priori known. Consequently, the SNR is rarely used in this latter area to g...
Conference Paper
Full-text available
If the Signal to Noise Ratio (SNR) is a �gure of merit com- monly used in many areas to gauge the quality of analogue measure- ments, its use in the context of Side-Channel Attacks (SCA) remains very di�cult because the nature and characteristics of the signals are not a priori known. Consequently, the SNR is rarely used in this latter area to gaug...
Article
In this paper, we propose a generic method to assess the vulnerability to Differential Fault Analysis of generalized Feistel networks (GFN). This method is based on an in-depth analysis of the GFN properties. First the diffusion of faults is studied, both at the block level and at the S-box level, in order to have a fault which maximizes the number...
Conference Paper
The Side Channel Analysis is now a classic way to retrieve a secret key in the smart-card world. Unfortunately, most of the ensuing attacks require the plaintext or the ciphertext used by the embedded algorithm. In this article, we present a new method for exploiting the leakage of a device without this constraint. Our attack is based on a study of...
Article
Full-text available
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the variation of device emanations to retrieve a secret key. These emanations can be the power consumption, the electromagnetic radiation, etc. Most of the time, those attacks use statistical methods to examine the relationship between the emanations and some...

Network

Cited By