• Electromagnetic Analysis Perturbation using Chaos Generator 

      Sarno, Thomas; Wacquez, Romain; Kussener, Edith; Maurine, Philippe; Jradi, Khalil; Portal, Jean-Michel; Aboulkassimi, Driss; Souiki-Figuigui, Sarra; Postel-Pellerin, Jeremy; Canet, Pierre; Chambonnea, Maxime; Grojo, David (2016-11-14)
      Text en actes de congrés
      Accés obert
      Cryptographic algorithms albeit mathematically sure may have security breaches when implemented on hardware chips. There are several ways to compromise their security, one method is to analyze their electromagnetic (EM) ...