Search Results - "Olivier Bronchain"
-
1
Side-Channel Countermeasures’ Dissection and the Limits of Closed Source Security Evaluations
Published in IACR transactions on cryptographic hardware and embedded systems (01-03-2020)“…We take advantage of a recently published open source implementation of the AES protected with a mix of countermeasures against side-channel attacks to discuss…”
Get full text
Journal Article -
2
Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors
Published in IACR transactions on cryptographic hardware and embedded systems (09-07-2021)“…We revisit Unterstein et al.’s leakage-resilient authenticated encryption scheme from CHES 2020. Its main goal is to enable secure software updates by…”
Get full text
Journal Article -
3
Reducing risks through simplicity: high side-channel security for lazy engineers
Published in Journal of cryptographic engineering (01-04-2021)“…Countermeasures against side-channel attacks are in general expensive, and a lot of research has been devoted to the optimization of their security versus…”
Get full text
Journal Article -
4
Enabling FrodoKEM on Embedded Devices
Published in IACR transactions on cryptographic hardware and embedded systems (09-06-2023)“…FrodoKEM is a lattice-based Key Encapsulation Mechanism (KEM) based on unstructured lattices. From a security point of view this makes it a conservative option…”
Get full text
Journal Article -
5
Multi-Tuple Leakage Detection and the Dependent Signal Issue
Published in IACR transactions on cryptographic hardware and embedded systems (01-02-2019)“…Leakage detection is a common tool to quickly assess the security of a cryptographic implementation against side-channel attacks. The Test Vector Leakage…”
Get full text
Journal Article -
6
A stealthy Hardware Trojan based on a Statistical Fault Attack
Published in Cryptography and communications (01-07-2021)“…Integrated Circuits (ICs) are sensible to a wide range of (passive, active, invasive, non-invasive) physical attacks. In this context, Hardware Trojans (HTs),…”
Get full text
Journal Article -
7
Side-channel analysis of a learning parity with physical noise processor
Published in Journal of cryptographic engineering (01-06-2021)“…Learning parity with physical noise (LPPN) has been proposed as an assumption on which to build authentication protocols based on the learning parity with…”
Get full text
Journal Article -
8
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
Published in IACR transactions on cryptographic hardware and embedded systems (26-08-2020)“…One important open question in side-channel analysis is to find out whether all the leakage samples in an implementation can be exploited by an adversary, as…”
Get full text
Journal Article -
9
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium
Published in IACR transactions on cryptographic hardware and embedded systems (31-08-2023)“…The post-quantum digital signature scheme CRYSTALS-Dilithium has been recently selected by the NIST for standardization. Implementing CRYSTALSDilithium, and…”
Get full text
Journal Article -
10
How to fool a black box machine learning based side-channel security evaluation
Published in Cryptography and communications (01-07-2021)“…Machine learning and deep learning algorithms are increasingly considered as potential candidates to perform black box side-channel security evaluations…”
Get full text
Journal Article -
11
MOE: Multiplication Operated Encryption with Trojan Resilience
Published in IACR Transactions on Symmetric Cryptology (19-03-2021)“…In order to lower costs, the fabrication of Integrated Circuits (ICs) is increasingly delegated to offshore contract foundries, making them exposed to…”
Get full text
Journal Article -
12
SCALib: A Side-Channel Analysis Library
Published in Journal of open source software (01-06-2023)Get full text
Journal Article -
13
Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit: with Application to Lattice-Based KEMs
Published in IACR transactions on cryptographic hardware and embedded systems (31-08-2022)“…The performance of higher-order masked implementations of lattice-based based key encapsulation mechanisms (KEM) is currently limited by the costly conversions…”
Get full text
Journal Article -
14
Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit
Published in IACR transactions on cryptographic hardware and embedded systems (01-08-2022)“…The performance of higher-order masked implementations of lattice-based based key encapsulation mechanisms (KEM) is currently limited by the costly conversions…”
Get full text
Journal Article -
15
Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit
Published in IACR transactions on cryptographic hardware and embedded systems (01-08-2022)“…The performance of higher-order masked implementations of lattice-based based key encapsulation mechanisms (KEM) is currently limited by the costly conversions…”
Get full text
Journal Article -
16
Breaking Masked Implementations with Many Shares on 32-bit Software Platforms
Published in IACR transactions on cryptographic hardware and embedded systems (01-07-2021)“…We explore the concrete side-channel security provided by state-of-theart higher-order masked software implementations of the AES and the (candidate to the…”
Get full text
Journal Article -
17
Breaking Masked Implementations with Many Shares on 32-bit Software Platforms: or When the Security Order Does Not Matter
Published in IACR transactions on cryptographic hardware and embedded systems (09-07-2021)“…We explore the concrete side-channel security provided by state-of-theart higher-order masked software implementations of the AES and the (candidate to the…”
Get full text
Journal Article -
18
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium
Published in IACR transactions on cryptographic hardware and embedded systems (12-03-2024)“…We present a set of physical profiled attacks against CRYSTALS-Dilithium that accumulate noisy knowledge on secret keys over multiple signatures, finally…”
Get full text
Journal Article -
19
Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended
Published in IEEE transactions on information forensics and security (2022)“…We extend the study of efficient profiled attacks on masking schemes initiated by Lerman and Markowitch (TIFS, 2019) in different directions. First, we study…”
Get full text
Journal Article -
20
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks
Published in IACR transactions on cryptographic hardware and embedded systems (01-03-2024)“…We present a set of physical profiled attacks against CRYSTALS-Dilithium that accumulate noisy knowledge on secret keys over multiple signatures, finally…”
Get full text
Journal Article