Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
644 results
-
-
Seminar
-
SemSecuElec
Do Not Trust Modern System-on-Chips - Electromagnetic fault injection against a System-on-Chip
Speaker : Ronan Lashermes
Electromagnetic fault injection (EMFI) is a well known technique to disturb the behavior of a chip and weaken its security. These attacks are still mostly done on simple microcontrollers since the fault effects is relatively simple and understood.Unlocking EMFI on modern System-on-Chips (SoCs), the fast and complex chips ubiquitous today, requires to understand the impact of the faults. In this[…] -
-
-
Seminar
-
SemSecuElec
Implémentations sécurisées et évaluation pré-silicium contre les attaques physiques.
Speaker : Sofiane Takarabt
Side-channel attacks remain a permanent threat against embedded systems, thus reliable protections should be implemented and must be minutely evaluated. In this presentation, we study different possible ways to evaluate against such threats. We show how an evaluation can be carried out to validate a security level of a protected hardware implementation. This approach allows us to estimate in[…] -
-
-
Seminar
-
SemSecuElec
Vers une meilleure compréhension de l’apprentissage profond appliqué aux attaques par observation
Speaker : Loïc Masure
Les attaques par observation (SCA) exploitent les failles d’une primitive cryptographique embarquée sur un composant (type carte à puce, IoT, …), en mesurant des grandeurs physiques qui dépendent indirectement de la valeur de la clé secrète. C’est pourquoi il est primordial pour les développeurs de proposer des contre-mesures adaptées et d’évaluer leur efficacité face à un attaquant potentiel.Au[…] -
-
-
Seminar
-
SemSecuElec
Schindler-Itoh/Wiemers revisited: recovering full RSA/ECC private key from noisy side-channel observations
Speaker : Victor Lomné et Thomas Roche
Side-channel attacks on public-key cryptography (i.e. modular exponentiation for RSA or scalar multiplication for ECC) often boils down to distinguishing the 0s from the 1s in the binary representation of the secret exponent (resp. secret scalar).When state-of-the-art countermeasures are implemented, this detection must be errorless: thanks to masking techniques, erroneous masked exponents (resp.[…] -
-
-
Seminar
-
SemSecuElec
Code-based postquantum cryptography : candidates to standardization
Speaker : Nicolas Sendrier
At the third round of the NIST standardization process, three candidates remain with a security based on error correcting codes, all are key exchange mechanisms. We will explore them according to their security assumptions and properties. Among them, we find an historical scheme (Classic McEliece), as well as schemes using sparse and quasi-cyclic matrices (BIKE and HQC). We will examine pros and[…] -
-
-
Seminar
-
SemSecuElec
Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages
Speaker : Léo Reynaud
Les attaques side channel classiques nécessitent généralement la connaissance du clair (ou du chiffré) afin de calculer des données internes qui seront comparées à des fuites. Des attaques permettent cependant de s’affranchir de ces connaissances, les attaques par distributions jointes. Ces attaques supposent un attaquant capable d’inverser le modèle de consommation, mais aucune connaissance sur[…] -