Practical Improvements of Side-Channel Attacks on AES Feedback From the 2nd DPA Contest, J. Cryptographic Engineering, vol.4, issue.4, pp.259-274, 2014. ,
Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule, IACR Cryptology ePrint Archive, p.877, 2015. ,
Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks, Cryptography and Communications, vol.49, issue.9, pp.121-162, 2015. ,
DOI : 10.1007/s12095-014-0112-7
URL : https://hal.archives-ouvertes.fr/hal-01218086
Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis, International Conference on Cryptology in India ? INDOCRYPT '13, pp.116-135, 2013. ,
DOI : 10.1007/978-3-319-03515-4_8
URL : https://hal.archives-ouvertes.fr/hal-00947642
Simple Power Analysis on AES Key Expansion Revisited, Cryptographic Hardware and Embedded Systems ? CHES '14, pp.279-297, 2014. ,
DOI : 10.1007/978-3-662-44709-3_16
URL : https://hal.archives-ouvertes.fr/hal-01218060
Reverse Engineering of a Secret AES-like Cipher by Ineffective Fault Analysis, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.119-128, 2013. ,
DOI : 10.1109/FDTC.2013.16
URL : https://hal.archives-ouvertes.fr/hal-00947634
Software Camouflage, Foundations and Practice of Security ? FPS '13, pp.122-139, 2013. ,
DOI : 10.1007/978-3-319-05302-8_8
Obtention d'un pic de DPA pour la bonne supposition de valeur de clef (en haut) et non-obtention d'un pic lors des mauvaises suppositions (en bas), p.13 ,
Obtention d'un pic de CPA pour la bonne supposition de valeur de clef (en haut) et non-obtention d'un pic lors des mauvaises suppositions (en bas), p.14 ,
Gauche : FIRE | Droite : SCARE), p.52 ,
Collision Attacks on AES-Based MAC: Alpha-MAC, Paillier and Verbauwhede [PV07], pp.166-180 ,
DOI : 10.1007/978-3-540-74735-2_12
Correlation Power Analysis with a Leakage Model, pp.16-29 ,
DOI : 10.1007/978-3-540-28632-5_2
On the Importance of Checking Cryptographic Protocols for Faults, Advances in Cryptology ? EUROCRYPT '97, pp.37-51, 1997. ,
DOI : 10.1007/3-540-69053-0_4
Improved Side-Channel Collision Attacks on AES ,
DOI : 10.1007/978-3-540-77360-3_6
Multiple-Differential Side-Channel Collision Attacks on AES, pp.30-44 ,
DOI : 10.1007/978-3-540-85053-3_3
Differential fault analysis of secret key cryptosystems, Advances in Cryptology ? CRYPTO '97, pp.513-525, 1997. ,
DOI : 10.1007/BFb0052259
Power Analysis of the Key Scheduling of the AES Candidates, Second AES Candidate Conference ? AES2, 1999. ,
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest, Journal of Cryptographic Engineering, vol.8, issue.1, pp.259-274, 2014. ,
DOI : 10.1007/s13389-014-0075-9
Improved Collision-Correlation Power Analysis on First Order Protected AES, Cryptographic Hardware and Embedded Systems ? CHES '11, pp.49-62, 2011. ,
DOI : 10.1007/978-3-642-23951-9_4
URL : https://hal.archives-ouvertes.fr/inria-00633527
Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks, Cryptography and Communications, vol.49, issue.9, pp.121-162, 2015. ,
DOI : 10.1007/s12095-014-0112-7
URL : https://hal.archives-ouvertes.fr/hal-01218086
Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis, International Conference on Cryptology in India ? INDOCRYPT '13, pp.116-135, 2013. ,
DOI : 10.1007/978-3-319-03515-4_8
URL : https://hal.archives-ouvertes.fr/hal-00947642
An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm, International Conference on Information Systems Security ? ICISS '07, pp.143-155, 2007. ,
DOI : 10.1007/978-3-540-77086-2_11
Secret External Encodings Do Not Prevent Transient Fault Analysis, Paillier and Verbauwhede [PV07], pp.181-194 ,
DOI : 10.1007/978-3-540-74735-2_13
Simple Power Analysis on AES Key Expansion Revisited, Batina and Robshaw [BR14], pp.279-297 ,
DOI : 10.1007/978-3-662-44709-3_16
URL : https://hal.archives-ouvertes.fr/hal-01218060
Reverse Engineering of a Secret AES-like Cipher by Ineffective Fault Analysis, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.119-128, 2013. ,
DOI : 10.1109/FDTC.2013.16
URL : https://hal.archives-ouvertes.fr/hal-00947634
SCARE of the DES, Applied Cryptography and Network Security ? ACNS '05, pp.393-406, 2003. ,
DOI : 10.1007/11496137_27
Software Camouflage, Foundations and Practice of Security ? FPS '13, pp.122-139, 2013. ,
DOI : 10.1007/978-3-319-05302-8_8
Get your hands off my laptop: physical side-channel key-extraction attacks on PCs, Batina and Robshaw [BR14], pp.242-260 ,
DOI : 10.1007/s13389-015-0100-7
Defeating Any Secret Cryptography with SCARE Attacks, Progress in Cryptology ? LATINCRYPT '10, pp.273-293, 2010. ,
DOI : 10.1007/978-3-642-14712-8_17
Observability Analysis - Detecting When Improved Cryptosystems Fail -, Topics in Cryptology ? CT-RSA '02, pp.17-29, 2002. ,
DOI : 10.1007/3-540-45760-7_2
Free VHDL 6502 core ,
Differential Power Analysis, Advances in Cryptology ? CRYPTO '99, pp.388-397, 1999. ,
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Advances in Cryptology ? CRYPTO '96, pp.104-113, 1996. ,
Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods, European Symposium on Research in Computer Security ? ESORICS '07, pp.454-468, 2007. ,
DOI : 10.1007/978-3-540-74835-9_30
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion, Information Security and Cryptology ? ICISC '02, pp.343-358, 2003. ,
DOI : 10.1007/3-540-36552-4_24
Investigations of Power Analysis Attacks on Smartcards, WOST '99 : Proceedings of the USENIX Workshop on Smartcard Technology, pp.151-162, 1999. ,
Using Second-Order Power Analysis to Attack DPA Resistant Software, pp.238-251 ,
Power analysis attacks revealing the secrets of smart cards, 2007. ,
Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards, Koç and Paar [KP00], pp.78-92 ,
DOI : 10.1007/3-540-44499-8_6
Side-Channel Attack on Substitution Blocks, Applied Cryptography and Network Security ? ACNS '03, pp.307-318 ,
DOI : 10.1007/978-3-540-45203-4_24
Sign-Based Differential Power Analysis, Workshop on Information Security Applications ? WISA '03, pp.203-216, 2003. ,
DOI : 10.1007/978-3-540-24591-9_16
FIRE : Fault Injection for Reverse Engineering Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication -5th IFIP WG 11.2 International Workshop, Proceedings, volume 6633 of Lecture Notes in Computer Science, pp.280-293, 2011. ,
SCARE of an Unknown Hardware Feistel Implementation, Smart Card Research and Advanced Application ? CARDIS '08, pp.218-227, 2008. ,
DOI : 10.1007/978-3-540-31815-6_35
Provably Secure Higher-Order Masking of AES, Cryptographic Hardware and Embedded Systems ? CHES '10, pp.413-427, 2010. ,
DOI : 10.1007/978-3-642-15031-9_28
SCARE of Secret Ciphers with SPN Structures, Advances in Cryptology ? ASIA- CRYPT '13, Lecture Notes in Computer Science, 2013. ,
DOI : 10.1007/978-3-642-42033-7_27
A Collision-Attack on AES, Joye and Quisquater, pp.163-175 ,
DOI : 10.1007/978-3-540-28632-5_12
A New Class of Collision Attacks and Its Application to DES, Fast Software Encryption ? FSE '03, pp.206-222, 2003. ,
DOI : 10.1007/978-3-540-39887-5_16
Side Channel Analysis, Fault Injection and Applications -A Computationally Feasible SPA Attack on AES via Optimized Search, Security and Privacy in the Age of Ubiquitous Computing ? SEC '05, pp.577-588, 2005. ,
Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis, IEEE Transactions on Computers, vol.49, issue.9, pp.967-970, 2000. ,