Simon Pontie

  • Citations Per Year
Learn More
Embedded systems are increasingly providing secure functionalities, which often rely on some dedicated hardware for symmetric and public-key cryptography. When resources are limited, elliptic curve cryptography (ECC) may be chosen instead of the more widely known RSA, which needs much longer keys for the same security level. However, ECC may be vulnerable,(More)
Crypto-processors must be protected against various types of attacks to secure the access to the secret information. In the case of Elliptic Curve Cryptography (ECC), Simple Power Analysis (SPA) can be very efficient to recover the secret key if no protection is implemented. However, lightweight implementations necessary in Internet of Things (IoT) objects(More)
High-Level Synthesis (HLS) is used by hardware developers to achieve higher abstraction in circuit descriptions. In order to shorten the hardware development time via HLS, we present an adjustment of the Iterative and Incremental Design (IID) methodology, frequently used in software development. In particular, our methodology is relevant for the development(More)
A large number of embedded systems require a high level of security. Elliptic curve cryptography is well suited for these constrained environments, but some countermeasures must be implemented to prevent leakage of critical data through side-channel analyses. This work attempts to propose one such countermeasure, without affecting performance. A windowing(More)
  • 1