Search Results - "Olivier Bronchain"

Refine Results
  1. 1

    Side-Channel Countermeasures’ Dissection and the Limits of Closed Source Security Evaluations by Olivier Bronchain, François-Xavier Standaert

    “…We take advantage of a recently published open source implementation of the AES protected with a mix of countermeasures against side-channel attacks to discuss…”
    Get full text
    Journal Article
  2. 2

    Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors by Bronchain, Olivier, Momin, Charles, Peters, Thomas, Standaert, François-Xavier

    “…We revisit Unterstein et al.’s leakage-resilient authenticated encryption scheme from CHES 2020. Its main goal is to enable secure software updates by…”
    Get full text
    Journal Article
  3. 3

    Reducing risks through simplicity: high side-channel security for lazy engineers by Bronchain, Olivier, Schneider, Tobias, Standaert, François-Xavier

    Published in Journal of cryptographic engineering (01-04-2021)
    “…Countermeasures against side-channel attacks are in general expensive, and a lot of research has been devoted to the optimization of their security versus…”
    Get full text
    Journal Article
  4. 4

    Enabling FrodoKEM on Embedded Devices by Bos, Joppe W., Bronchain, Olivier, Custers, Frank, Renes, Joost, Verbakel, Denise, Van Vredendaal, Christine

    “…FrodoKEM is a lattice-based Key Encapsulation Mechanism (KEM) based on unstructured lattices. From a security point of view this makes it a conservative option…”
    Get full text
    Journal Article
  5. 5

    Multi-Tuple Leakage Detection and the Dependent Signal Issue by Olivier Bronchain, Tobias Schneider, François-Xavier Standaert

    “…Leakage detection is a common tool to quickly assess the security of a cryptographic implementation against side-channel attacks. The Test Vector Leakage…”
    Get full text
    Journal Article
  6. 6

    A stealthy Hardware Trojan based on a Statistical Fault Attack by Momin, Charles, Bronchain, Olivier, Standaert, François-Xavier

    Published in Cryptography and communications (01-07-2021)
    “…Integrated Circuits (ICs) are sensible to a wide range of (passive, active, invasive, non-invasive) physical attacks. In this context, Hardware Trojans (HTs),…”
    Get full text
    Journal Article
  7. 7

    Side-channel analysis of a learning parity with physical noise processor by Kamel, Dina, Bellizia, Davide, Bronchain, Olivier, Standaert, François-Xavier

    Published in Journal of cryptographic engineering (01-06-2021)
    “…Learning parity with physical noise (LPPN) has been proposed as an assumption on which to build authentication protocols based on the learning parity with…”
    Get full text
    Journal Article
  8. 8

    Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint by Guo, Qian, Grosso, Vincent, Standaert, François-Xavier, Bronchain, Olivier

    “…One important open question in side-channel analysis is to find out whether all the leakage samples in an implementation can be exploited by an adversary, as…”
    Get full text
    Journal Article
  9. 9

    From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium by ElGhamrawy, Mohamed, Azouaoui, Melissa, Bronchain, Olivier, Renes, Joost, Schneider, Tobias, Schönauer, Markus, Seker, Okan, Van Vredendaal, Christine

    “…The post-quantum digital signature scheme CRYSTALS-Dilithium has been recently selected by the NIST for standardization. Implementing CRYSTALSDilithium, and…”
    Get full text
    Journal Article
  10. 10

    How to fool a black box machine learning based side-channel security evaluation by Bertrand Van Ouytsel, Charles-Henry, Bronchain, Olivier, Cassiers, Gaëtan, Standaert, François-Xavier

    Published in Cryptography and communications (01-07-2021)
    “…Machine learning and deep learning algorithms are increasingly considered as potential candidates to perform black box side-channel security evaluations…”
    Get full text
    Journal Article
  11. 11

    MOE: Multiplication Operated Encryption with Trojan Resilience by Bronchain, Olivier, Faust, Sebastian, Lallemand, Virginie, Leander, Gregor, Perrin, Léo, Standaert, François-Xavier

    Published in IACR Transactions on Symmetric Cryptology (19-03-2021)
    “…In order to lower costs, the fabrication of Integrated Circuits (ICs) is increasingly delegated to offshore contract foundries, making them exposed to…”
    Get full text
    Journal Article
  12. 12
  13. 13

    Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit: with Application to Lattice-Based KEMs by Bronchain, Olivier, Cassiers, Gaëtan

    “…The performance of higher-order masked implementations of lattice-based based key encapsulation mechanisms (KEM) is currently limited by the costly conversions…”
    Get full text
    Journal Article
  14. 14

    Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit by Olivier Bronchain, Gaëtan Cassiers

    “…The performance of higher-order masked implementations of lattice-based based key encapsulation mechanisms (KEM) is currently limited by the costly conversions…”
    Get full text
    Journal Article
  15. 15

    Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit by Olivier Bronchain, Gaëtan Cassiers

    “…The performance of higher-order masked implementations of lattice-based based key encapsulation mechanisms (KEM) is currently limited by the costly conversions…”
    Get full text
    Journal Article
  16. 16

    Breaking Masked Implementations with Many Shares on 32-bit Software Platforms by Olivier Bronchain, François-Xavier Standaert

    “…We explore the concrete side-channel security provided by state-of-theart higher-order masked software implementations of the AES and the (candidate to the…”
    Get full text
    Journal Article
  17. 17

    Breaking Masked Implementations with Many Shares on 32-bit Software Platforms: or When the Security Order Does Not Matter by Bronchain, Olivier, Standaert, François-Xavier

    “…We explore the concrete side-channel security provided by state-of-theart higher-order masked software implementations of the AES and the (candidate to the…”
    Get full text
    Journal Article
  18. 18

    Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium by Bronchain, Olivier, Azouaoui, Melissa, ElGhamrawy, Mohamed, Renes, Joost, Schneider, Tobias

    “…We present a set of physical profiled attacks against CRYSTALS-Dilithium that accumulate noisy knowledge on secret keys over multiple signatures, finally…”
    Get full text
    Journal Article
  19. 19

    Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended by Bronchain, Olivier, Durvaux, Francois, Masure, Loic, Standaert, Francois-Xavier

    “…We extend the study of efficient profiled attacks on masking schemes initiated by Lerman and Markowitch (TIFS, 2019) in different directions. First, we study…”
    Get full text
    Journal Article
  20. 20

    Exploiting Small-Norm Polynomial Multiplication with Physical Attacks by Olivier Bronchain, Melissa Azouaoui, Mohamed ElGhamrawy, Joost Renes, Tobias Schneider

    “…We present a set of physical profiled attacks against CRYSTALS-Dilithium that accumulate noisy knowledge on secret keys over multiple signatures, finally…”
    Get full text
    Journal Article