Learn More
Since the first announcement of a Side Channel Analysis (SCA) about ten years ago, considerable research has been devoted to studying these attacks on Application Specific Integrated Circuits (ASICs), such as smart cards or TPMs. In this article, we compare power-line attacks with ElectroMagnetic (EM) attacks, specifically targeting Field Programmable Gate(More)
In this paper, we propose a preprocessing method to improve Side Channel Attacks (SCAs) on Dual-rail with Precharge Logic (DPL) countermeasure family. The strength of our method is that it uses intrinsic characteristics of the countermeasure: classical methods fail when the countermeasure is perfect, whereas our method still works and enables us to perform(More)
[1] The spread of mineral particles over southwestern, western, and central Europe resulting from a strong Saharan dust outbreak in October 2001 was observed at 10 stations of the European Aerosol Research Lidar Network (EARLINET). For the first time, an optically dense desert dust plume over Europe was characterized coherently with high vertical resolution(More)
—FPGAs are often considered for high-end applications that require embedded cryptography. These devices must thus be protected against physical attacks. However, unlike ASICs, in which custom and backend-level countermeasures can be devised, FPGAs offer less possibilities for a designer to implement countermeasures. We investigate " wave dynamic(More)
The purpose of our study was to define the signal characteristics and clinical circumstances associated with emboli detected in the middle cerebral artery using 2-MHz pulsed transcranial Doppler ultrasound in patients undergoing carotid endarterectomy. Signals designating emboli were transients displaying harmonic qualities the signatures of which were(More)
—Detecting hardware trojans is a difficult task in general. In this article we study hardware trojan horses insertion and detection in cryptographic intellectual property (IP) blocks. The context is that of a fabless design house that sells IP blocks as GDSII hard macros, and wants to check that final products have not been infected by trojans during the(More)
Straightforward implementations of cryptographic algorithms are known to be vulnerable to attacks aimed not at the mathematical structure of the cipher but rather at the weak points of the electronic devices which implement it. These attacks, known as side-channel attacks, have proved to be very powerful in retrieving secret keys from any kind of(More)