Laurent Sauvage

Learn More
Albert Ansmann, Jens Bösenberg, Anatoli Chaikovsky, Adolfo Comerón, Sabine Eckhardt, Ronald Eixmann, Volker Freudenthaler, Paul Ginoux, Leonce Komguem, Holger Linné, Miguel Ángel López Márquez, Volker Matthias, Ina Mattis, Valentin Mitev, Detlef Müller, Svetlana Music, Slobodan Nickovic, Jacques Pelon, Laurent Sauvage, Piotr Sobolewsky, Manoj K. Srivastava,(More)
Since the first announcement of a Side Channel Analysis (SCA) about ten years ago, considerable research has been devoted to studying these attacks on Application Specific Integrated Circuits (ASICs), such as smart cards or TPMs. In this article, we compare power-line attacks with ElectroMagnetic (EM) attacks, specifically targeting Field Programmable Gate(More)
FPGAs are often considered for high-end applications that require embedded cryptography. These devices must thus be protected against physical attacks. However, unlike ASICs, in which custom and backend-level counter-measures can be devised, FPGAs offer less possibilities for a designer to implement counter-measures. We investigate “wave dynamic(More)
In this paper, we propose a preprocessing method to improve Side Channel Attacks (SCAs) on Dual-rail with Precharge Logic (DPL) countermeasure family. The strength of our method is that it uses intrinsic characteristics of the countermeasure: classical methods fail when the countermeasure is perfect, whereas our method still works and enables us to perform(More)
Detecting hardware trojans is a difficult task in general. In this article we study hardware trojan horses insertion and detection in cryptographic intellectual property (IP) blocks. The context is that of a fabless design house that sells IP blocks as GDSII hard macros, and wants to check that final products have not been infected by trojans during the(More)
Straightforward implementations of cryptographic algorithms are known to be vulnerable to attacks aimed not at the mathematical structure of the cipher but rather at the weak points of the electronic devices which implement it. These attacks, known as side-channel attacks, have proved to be very powerful in retrieving secret keys from any kind of(More)
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful attacks can exploit few of them to recover the full secrets. Most of the resistance techniques to fault attacks have relied so far on the detection of faults. We present in this(More)
The security of cryptographic implementations relies not only on the algorithm quality but also on the countermeasures to thwart attacks aiming at disclosing the secrecy. These attacks can take advantage of the secret leakages appearing through the power consumption or the electromagnetic radiations also called “Side Channels”. This is for instance the case(More)