Publications

Filter by type:

Under the dome: preventing hardware timing information leakage

Details PDF

Electromagnetic fault injection against a complex CPU, toward new micro-architectural fault models

Details PDF

Recommendations for a radically secure ISA

Details PDF

A case against indirect jumps for secure programs

Details PDF

Electromagnetic fault injection against a System-on-Chip, toward new micro-architectural fault models

Details PDF

Hardware-Assisted Program Execution Integrity: HAPEI

Details PDF

When fault injection collides with hardware complexity

Details

Let’s shock our IoT’s heart: ARMv7-M under (fault) attacks

Details PDF

Vérifier un code PIN

Details PDF

Attaques par fautes

Details PDF

How TrustZone could be bypassed: Side-Channel Attacks on a modern System-on-Chip

Details PDF

A Multi-Round Side Channel Attack on AES using Belief Propagation

Details PDF Slides

High-performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication

Details PDF Slides

A template attack against VERIFY PIN algorithms

Details PDF Slides

On the security of pairing implementations

Details PDF

Practical Validation of Several Fault Attacks against the Miller Algorithm

Details PDF Slides

Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults

Details PDF

A DFA on AES based on the entropy of error distributions

Details PDF