Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

657 results

    • Seminar

    • SemSecuElec

    Implémentations sécurisées et évaluation pré-silicium contre les attaques physiques.

    • February 04, 2022

    • Secure-IC - Web-conférence

    Speaker : Sofiane Takarabt

    Side-channel attacks remain a permanent threat against embedded systems, thus reliable protections should be implemented and must be minutely evaluated. In this presentation, we study different possible ways to evaluate against such threats. We show how an evaluation can be carried out to validate a security level of a protected hardware implementation. This approach allows us to estimate in[…]
    • Seminar

    • SemSecuElec

    One Fault Can Go A Long Way

    • November 15, 2019

    • Nanyang Technological University - Métivier

    Speaker : Shivam Bhasin

    *Abstract:* Fault attacks are considered among critical threat to embedded cryptography. This talk will be divided into in two parts. The first part of the talk will explore application of faults on advanced security primitives. We present persistent fault analysis introduced at CHES 2017 and its capability to bypass state of the art fault countermeasures as well as higher-order masking with one[…]
    • Seminar

    • SemSecuElec

    Schindler-Itoh/Wiemers revisited: recovering full RSA/ECC private key from noisy side-channel observations

    • September 28, 2018

    • NinjaLab - Salle Métivier

    Speaker : Victor Lomné et Thomas Roche

    Side-channel attacks on public-key cryptography (i.e. modular exponentiation for RSA or scalar multiplication for ECC) often boils down to distinguishing the 0s from the 1s in the binary representation of the secret exponent (resp. secret scalar).When state-of-the-art countermeasures are implemented, this detection must be errorless: thanks to masking techniques, erroneous masked exponents (resp.[…]
    • Seminar

    • SemSecuElec

    Rank metric cryptography and its implementations

    • October 08, 2021

    • XLIM – Université de Limoges - Salle Pétri/Turing

    Speaker : Nicolas Aragon

    In 2017, the NIST (National Institute for Standards and Technology) started astandardization process in order to select post-quantum encryption and digital signature schemes. Among the proposed solutions, two rank-metric based encryption schemes were selected for the second round of the standardization process: ROLLOand RQC.This raised questions about both the performance and the security of the[…]
    • Seminar

    • SemSecuElec

    Laser-Based Attacks Against FPGA Bitstream Encryption

    • June 07, 2019

    • Technische Universität Berlin - Salles Petri/Turing

    Speaker : Heiko Lohrke

    Field programmable gate arrays (FPGAs) use encryption to protect the configuration data or “bitstream” containing the design to be run on the device. This encryption aims at protecting the intellectual property and other secrets contained in the bitstream and preventing e.g. cloning or tampering with an FPGA implementation.This talk will demonstrate how attackers can use failure analysis equipment[…]
    • Seminar

    • SemSecuElec

    Security of Hardware/Software Interfaces : Research Chair of the Cybersecurity Research Cluster

    • June 22, 2018

    • Centrale-Supelec - Salles Petri/Turing

    Speaker : Guillaume Hiet

    We proposed to host a thematic semester on attacks based on the interaction between software and hardware. The goal would be to host one workshop, one summer school for young researchers, as well as multiple seminars and longer stays for researchers, spanning September 2019 to March or April 2020. This thematic semester will be funded by the DGA in the context of the Cybersecurity Research Cluster[…]