• Publications
  • Influence
Fault analysis of GRAIN-128
TLDR
We propose a fault attack on GRAIN-128 based on a realistic fault model and explores possible improvements of the attack. Expand
  • 52
  • 8
  • PDF
Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable
TLDR
We provide here an extension of a recent attack [BCG08] based on the public modulus corruption. Expand
  • 26
  • 1
  • PDF
A First ISA-Level Characterization of EM Pulse Effects on Superscalar Microarchitectures: A Secure Software Perspective
TLDR
We try to model the behavior of secure software running on a superscalar out-of-order microprocessor typical of more complex SoC, in the presence of electromagnetic (EM) pulses. Expand
  • 7
  • 1
  • PDF
Perturbating RSA Public Keys: An Improved Attack
TLDR
We describe here a new fault attack on RSA public elements. Expand
  • 28
  • PDF
Compiler-Assisted Loop Hardening Against Fault Attacks
TLDR
We propose a generic compile-time loop hardening scheme based on the duplication of termination conditions and of the computations involved in the evaluation of such conditions. Expand
  • 16
Fault Analysis of Rabbit: Toward a Secret Key Leakage
TLDR
This paper introduces an improved fault attack against implementations of Rabbit. Expand
  • 16
  • PDF
In(security) Against Fault Injection Attacks for CRT-RSA Implementations
TLDR
We show that the Ciet-Joye method proposed in FDTC'2005 does not completely prevent fault injection attacks: for a CRT-RSA with a 1024-bit modulus, we show that 13 faulty signatures are enough to recover the secret exponent with a probability greater than 50%, which can be improved to 99% with 83 faulty signatures. Expand
  • 20
  • PDF
Public Key Perturbation of Randomized RSA Implementations
TLDR
We propose a new method to recover the RSA private key from an SPA analysis under a practical fault model. Expand
  • 14
  • PDF
Studying EM Pulse Effects on Superscalar Microarchitectures at ISA Level
TLDR
We try to model the behavior of secure software running on a superscalar out-of-order microprocessor typical of more complex SoC, in the presence of electromagnetic (EM) pulses. Expand
  • 5
  • PDF
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems
TLDR
We develop a new attack of DLP-based cryptosystems, built in addition on a lattice analysis [26] to recover DSA public keys from partially known nonces. Expand
  • 1
  • PDF
...
1
2
...