121 research outputs found

    Differential electromagnetic attack on an FPGA implementation of elliptic curve cryptosystems

    Get PDF
    This paper describes a differential electromagnetic analysis attack performed on a hardware implementation of an elliptic curve cryptosystem. We describe the use of the distance of mean test. The number of measurements needed to get a clear idea of the right guess of the key-bit is taken as indication of the success of the attack. We can find the right key-bit by using only 2000 measurements. Also we give a electromagnetic model for the FPGA we use in our experiments. The amplitude, the direction and the position of the current on the FPGA’s lines with respect to the position of the antenna have an influence on the measured electromagnetic radiation in the FPGA’s surrounding area

    Advanced RF/Baseband Interconnect Schemes for Inter- and Intra-ULSI Communications

    Full text link

    Software countermeasures for control flow integrity of smart card C codes

    Get PDF
    International audienceFault attacks can target smart card programs in order to disrupt an execution and gain an advantage over the data or the embedded functionalities. Among all possible attacks, control flow attacks aim at disrupting the normal execution flow. Identifying harmful control flow attacks as well as designing countermeasures at software level are tedious and tricky for developers. In this paper, we propose a methodology to detect harmful intra-procedural jump attacks at source code level and to automatically inject formally-proven countermeasures. The proposed software countermeasures defeat 100% of attacks that jump over at least two C source code statements or beyond. Experiments show that the resulting code is also hardened against unexpected function calls and jump attacks at assembly level

    Cracking Unix Passwords using FPGA Platforms

    Get PDF
    Contains fulltext : 127468.pdf (preprint version ) (Open Access)SHARCS - Special Purpose Hardware for Attacking Cryptographic Systems, February 24-25, Paris, 2005 : ECRYPT Worksho

    Security of countermeasures against state-of-the-art differential scan attacks

    Get PDF
    Contains fulltext : 119968.pdf (preprint version ) (Open Access)TRUDEVICE 2013 : first workshop on trustworthy manufacturing and utilization of secure devices, May 30-31, 2013, Popes'Palace, Avignon(France

    HW/SW Co-design of TA/SPA-resistant Public-key Cryptosystems

    Get PDF
    Contains fulltext : 127469.pdf (preprint version ) (Open Access)CRASH 2005 : Cryptographic Advances in Secure Hardware, Leuven, September 6-7, 200

    Low-Power Electronics and Design

    No full text

    DATE 2022: Aiming for an Online/ Onsite Format and Finally Moving to Online only

    No full text
    Based on the past two years of experience as an online event due to the Covid-19 outbreak, DATE 2022 has been planned to cope with the uncertainty of the situation, having two days onsite, in Antwerp, Belgium, from March 14 to 15, 2022, to be followed by an online program until March 23, 2022. A different organization and format had been adopted to engage the DATE community, with a two-day rich program and numerous talks and panels to gather again, in person. The scientific program online had been completed by live panels and presentations to offer a valuable virtual experience. Unfortunately, for the third year in a row, DATE moved to a completely virtual event, which nevertheless attracted a broad audience
    • 

    corecore