scispace - formally typeset
D

Delphine Leresteux

Researcher at University of Paris

Publications -  6
Citations -  102

Delphine Leresteux is an academic researcher from University of Paris. The author has contributed to research in topics: Modular exponentiation & Chosen-ciphertext attack. The author has an hindex of 6, co-authored 6 publications receiving 90 citations.

Papers
More filters
Book ChapterDOI

Meet-in-the-middle and impossible differential fault analysis on AES

TL;DR: This paper gives an answer to the question if provoking a fault at a former round of the cipher allows to recover the key by showing two practical cryptographic attacks on one round earlier of AES-128 and for all keysize variants.
Proceedings ArticleDOI

Using faults for buffer overflow effects

TL;DR: It is shown by using one example that countermeasures against buffer overflow must also be used for software running on embedded processors, taking the control of a machine as buffer overflow attacks do.
Journal ArticleDOI

Attacking RSA–CRT signatures with faults on montgomery multiplication

TL;DR: This paper presents several efficient fault attacks against implementations of RSA–CRT signatures that use modular exponentiation algorithms based on Montgomery multiplication, and shows that these models are quite realistic, as such faults can be achieved against many proposed hardware designs for RSA signatures.
Book ChapterDOI

Cache timing analysis of RC4

TL;DR: A new state recovery analysis on RC4 using a belief propagation algorithm that works well and its soundness is proved for known or unknown plaintext and only requires that the attacker queries the RC4 encryption process byte by byte for a practical attack.
Posted Content

Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication.

TL;DR: In this paper, the authors present several efficient fault attacks against implementations of RSA-CRT signatures that use modular exponentiation algorithms based on Montgomery multiplication, and they apply to any padding function, including randomized paddings, and as such are the first fault attacks effective against RSAPSS.