Generic SCARE: reverse engineering without knowing the algorithm nor the machine
Details
PDF
Characterizing and Modeling Synchronous Clock-Glitch Fault Injection
Details
PDF
La sécurité des abstractions en informatique
Details
PDF
Under the dome: preventing hardware timing information leakage
Details
PDF
Electromagnetic fault injection against a complex CPU, toward new micro-architectural fault models
Details
PDF
Recommendations for a radically secure ISA
Details
PDF
A case against indirect jumps for secure programs
Details
PDF
Electromagnetic fault injection against a System-on-Chip, toward new micro-architectural fault models
Details
PDF
When fault injection collides with hardware complexity
Details
Let’s shock our IoT’s heart: ARMv7-M under (fault) attacks
Details
PDF
How TrustZone could be bypassed: Side-Channel Attacks on a modern System-on-Chip
Details
PDF
A Multi-Round Side Channel Attack on AES using Belief Propagation
Details
PDF
Slides
High-performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication
Details
PDF
Slides
On the security of pairing implementations
Details
PDF
Practical Validation of Several Fault Attacks against the Miller Algorithm
Details
PDF
Slides
Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults
Details
PDF
A DFA on AES based on the entropy of error distributions
Details
PDF