scispace - formally typeset
C

Christophe Clavier

Researcher at Gemalto

Publications -  51
Citations -  4293

Christophe Clavier is an academic researcher from Gemalto. The author has contributed to research in topics: Exponentiation & Side channel attack. The author has an hindex of 17, co-authored 48 publications receiving 3937 citations. Previous affiliations of Christophe Clavier include University of Limoges.

Papers
More filters
Book ChapterDOI

Correlation Power Analysis with a Leakage Model

TL;DR: A classical model is used for the power consumption of cryptographic devices based on the Hamming distance of the data handled with regard to an unknown but constant reference state, which allows an optimal attack to be derived called Correlation Power Analysis.
Journal Article

Differential power analysis in the presence of hardware countermeasures

TL;DR: Different ways to attack devices featuring random process interrupts and noisy power consumption are examined.
Book ChapterDOI

Differential Power Analysis in the Presence of Hardware Countermeasures

TL;DR: In this paper, the authors examine different ways to attack devices featuring random process interrupts and noisy power consumption, and show that such protections do not make attacks infeasible, but increase the attacker's experimental (data acquisition) and computational workload beyond reasonable limits.
Book ChapterDOI

Horizontal correlation analysis on exponentiation

TL;DR: In this paper, the authors present a technique in which they apply correlation analysis using only one execution power curve during an exponentiation to recover the whole secret exponent manipulated by the chip, which cannot be prevented by exponent blinding.
Posted Content

Horizontal Correlation Analysis on Exponentiation.

TL;DR: In this article, the authors present a technique in which they apply correlation analysis using only one execution power curve during an exponentiation to recover the whole secret exponent manipulated by the chip and analyze the efficiency of classical countermeasures with respect to their attack.